id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00002368_processed.jsonl/45899 | Rearrangements and Stereomutations of Metallacycles Derived from Allenes and Imidozirconium Complexes MichaelForrest E. DuncanAndrew P. SweeneyZachary K. BergmanRobert G. 2005 The mechanisms of the rearrangements and stereoinversion of azametallacyclobutenes generated via [2+2] cycloaddition of allenes and imidozirconium complexes have been studied. Metallacycles derived from allenes bearing β-hydrogen atoms racemize at room temperature by reversible β-hydride elimination, a process which is also responsible for their eventual conversion to monoazadiene complexes. Metallacycles derived from diarylallenes racemize by reversible thermal bond homolysis at 95 °C; racemization of these metallacycles is also catalyzed by mild oxidants. |
global_01_local_0_shard_00002368_processed.jsonl/45926 | Laptops in school
We tend to see things in terms of what we have experienced – I agree with Carr, it is something I have been aware of for some time. If this is true then it begs the obvious question – how can we see what we have not experienced without being shown it, or is it possible to either actively look for it, or stumble upon it and then how do we recognise it.
Consider the problem of people planning to use something, lets say X. They have no experience of X and how it fits what they have experienced. Even if they try X they fit it into their experiences and shape it to fit. How do they see new uses of X – possibly we might just dismiss difference or in fact, not even see the differences, let alone grasp their significance. Proponents of X’s tend to be sales oriented and/or self interested. I am not saying this is a bad thing, but where does the critical appraisal come from?
For example, take computer technology like a laptop + Internet in the hands of kids in the classroom. Clearly, this is an X.
Teachers have no prior experience, X was not around in their classrooms and not in most teacher training, even in the last 10 years, the people running the teacher training had no experience of X, and even if they positted on it they had no or little direct experience of X.
Gibson coined the term Cyberspace and more importantly said something along the lines that the street finds a use for things – I would add especially in the void of guidance. In the classroom over the last nearly 20 years we have let net enabled laptops into the classroom, in the absence of guidance the kids will find a use for it, but so what.
The brain can adapt but this does not mean that it is adapting in a thinking or evaluative way, bit of pardox really. The brain can adapt, but so what, it has no way of knowing if the adaption is worthwhile – this is the point that is Carr is making about moving from distraction to deep reading back to a distracting environment, the brain has handled each stage but again so what.
We need teachers to guide – but how do we deal with the X?
That is a serious question – how do we teach teachers about how to use and assess the worth of net enabled laptops in the classroom?
Silence in a classroom
Seems odd to me that quietness in a classroom is now something that just does not happen: ever. I don’t mean quietness brought about by draconian means, I mean quietness impossed by the student themselves becasue they see it as and important aspect to learning. To me a modern classroom must be a nightmare for those students who want some quiet time!
I remember being kicked out of class in 6th grade and being told to go to the library – I loved it, there was no body there (probably a librarian hiding from me) but a pile of books, I did my project (yep we had them in those days as well) on bees – I can still see the bees eye and the diagram I drew. The next lession I asked if I could go to the library again – alas I made stay in a class of 35 kids.
Distracted brain and deep thinking
Carr N, 2010 The Shallows: what the Internet is doing to my brain, W.W. Norton & Compnay, NY
Nicholas Carr’s recent book ‘The Shallows’ makes interesting reading – he asks is the Internet stopping him from thinking. In it he presents the case that our brains are able to respond to changing circumstances and are not fixed or grow more fixed as we age, more the rate of change is related to changes in out environment which is likely to impact the way the brain responds. In other words, if you tend to do the same thing each day your brain will remain fixed in the way it operates, but if it gets presented with a new environment it will change especially more towards processing distractions rather than direct focus on one activity e.g. book reading, which is truly a learned skill that has re-shaped the brain away from its favoured role of processing many inputs – like a neural-network warning system, obviously a useful thing to posses when you want to go to the toilet surrounded by hostiles, much better than being able to deeply understand the book you maybe reading whilst on the toilet.
As educators we are all interested in and use the Internet, and many wonder if our book reading may be on the slide, and therefore is it possible to fully understand something using distracting media such as the web rather than a single focus on deep reading of books. Carr makes the point that in ancient times the facility of our brain to respond and process external stimuli i.e. multi-tasking small amounts of information in a small time frame was a powerful survival skill (see my toilet example above), but not necessarily one that allowed us to pull things to together via deep reflection to allow concept building and the like.
He then talks about the impact of inserting spaces between words in sentences and the possible impact this had on how our brain functioned. At the start there were no spaces, the written word simply mirrored the spoken word as a flow of sound, silent reading was not done, all reading was aloud. This meant that the brain had to do a parsing translation first to recognise the start and end of a word, sound it out and then pass on without having a chance to grasp full meaning of the past sequence- at least it was a time consuming task that was, it is thought, a distraction from thinking & understanding. In some ways, I see him arguing that our reading was more like us acting as a tape player – the thinking would have been done by the listener not the reader. You did not have time as you were engaged in a two step process of mentally inserting spaces. Computer language compilers do there reverse when they compile, in lexical analysis all unwanted symbols are removed and the program is packed into a long set of symbols. This string is then checked to see that it obeys the syntax rules of the language and if so the program is executed. But at no stage does the computer understand what the symbols mean, AI has and is making huge steps but to say a computer might understand ‘the sky is blue’ as we might is still a little way of.
Consider reading a sentence like theskyisblue – when you read this you have to parse the line to pluck out the words, and then read them one at a time and consciously keep the past words in short term memory if we are to try and get meaning. When we read ‘the sky is blue’ I don’t think we do quite the same thing, the space is looked for and we tend to group the words and are not conscious of reading each individual word, we are looking for meaning, whereas in the other example we are looking for words and then attempting to derive meaning. It is an interesting idea. Possibly our brains have altered to do this, so Carr argues. Also, web addresses have a similar problem don’t they – can’t yet have spaces, this used to apply to Windows and there was a whole era of the use of _ or pseudo spaces, Unix still uses these to allow easy reading of names of things.
The invention of the space between words changed this process, and according to Carr would have lead to a change in the way the brain functions away from symbol processing to in depth understanding. The act of reading was hugely impacted by the space between words, it made silent reading possible and to be able to spend many hours focused on gaining full understanding without distraction – Carr’s argument is that the actual wiring or behaviour of the brain changed and we potentially became much worse at paying attention to distractions. The effectiveness of our survival mechanism was lessened at the expense of our ability to think deeply – again an interesting proposition.
With the advent of the web and other digital devices we are, he argues, returning to an early era where we are bombarded by distractions – much like we were in the forests of pre-man, and that we don’t have time to understand in a deep way the significance of what we encounter. The reason for this Carr argues is that we are constantly stopping to process things like what hypertext link to follow, a new text message, a new popup screen etc. the opportunity to read and fully comprehend is constantly interrupted, often in an imperceptible way.
Again an interesting idea I feel.
Possibly we need to look at the process of obtaining the information and then absorbing and understanding it as a distinctly two step thing. When I use the web I am very conscious of not attempting to understand what I find but to store it so that I can retrieve it latter in an attempt to understand it. I recognised early on that the web is a gathering medium rather than one that directly informs you without further analytic effort on your part. Lets consider some examples of questions we can ask using a web browser.
What is the temperature today – this we will get directly answered.
My partner is having a birthday what should I buy – of course some wag may have developed a website “” (see the word space problem) and this might flash up and then present a lot of options with pop up screens etc. You need to navigate through to find suitable things, but you make the decision – unless of course you enter a range of characteristics and the database pops up the end choice so that you don’t have to make it. The latter is the old idea of an expert system mirroring a humans thought-skill process – this is handing over control to HAL.
The significance of global warming and the reliability of the simulations used by scientists – Yes, I’d like to know about that. The key question to me is if the web just allows you to access the information and then it is your responsibility to understand it, or does the web help in the understanding process, in other words the retrieval is more than just a technical issue, the act of retrieval carries with it some level of judgment as to what might be or might not be important, but how does the computer know what is or is not important? Page hits and the like make the assumption that your question can be classified based on what has been asked in the past. However, this does not take into account a persons motivations for asking the question in the first place, so I would think the responsibility still lies with us.
If we teach web surfing as research with a distinct consolidation phase before analysis and interpretation and then essay or argument development it would seem to me a simple strategy that would enable us to develop both aspects of the brain – I am not sure that it is a dichotomy, it would seem to me to present the challenge of teaching traditional research processes which at some point requires a single in deepth effort to bring things together.
There is also a romantic, rightly so, view of libraries. In the past 20 years I may have borrowed 100 books, but when I was in the library I am constantly processing distractions or evaluating and making intervening decisions about which book, which index to use, saying hi to friend, asking for help, using the photocopier – it never once occurred to me that my library use was other than a distinctly two step process. The first step is about gathering and dealing with distractions, the second is about synthesis – librarians know this. Seems to me the web promotes my model rather well, unless you are simply wanting the web to tell you the direct answer that you can cut and paste!
If the argument holds that technology can change the way the brain fires up, then we need to be asking ourselves some questions:
1. Is it possible to develop facility with the distracting environment of the web and also develop the ability to deeply understand things?
2. If we are able to use and enjoy the multi-distracting potential for interpreting what actions to take on the web does such interaction interfere with our capacity to deeply understand?
3. Is it possible to use the web and learn at the same time, if so, does this apply to deep learning type situations or is there need to structure our research into an obviously two staged process – one the hunter gather stage using and handing all the distraction to compile resources we think will be handy and then a quiet ‘reading’ phase away from the distractions in order to sequenctially read to gain understanding, to enable use to compare and contrast etc. Answer seems simple enough to me.
Carr seems to be mostly worried, correctly in my view, that students will become expert users and gain a certain competency at living with the distracted environment. Things will be understood in bits and be accessed when needed – begs the question of when you will know it is the right time to ask though. However, this may come at the expense of gaining deep understanding or in developing skills in dealing with changes to the environment you live in.
For example, take the issue of global warming. If we live in the distracted world of the Internet how will this help us gain an understanding without at some point going deeper, or do we just accept the authority of our leaders, who I reckon often have less scientific training than a 12th grader! It seems to me that handing over our lives to live in the Internet world brings with it a responsibility to recognise that we still need to develop indeepth understanding and that is probably best done in quite and over a long period of time.
Group work in schools and at Uni has exploded over the past ten years, and there are good reasons for group work, as is the case for increased project work. But it is difficult to undertake both without at some stage students having quiet time to reflect and build indeepth personal understanding. Discussion is great, often only the loudest is heard, but it is not a substitute for sitting down and thinking and writing down logically what you wish to say, this requires analysis, drawing together threats from different sources and ethical committement – it is your work, you thought about it. I would love to hear kids say that ‘this is my work and I have thought about……a lot, and I still don’t know if I fully understand it’……Join the club mate. |
global_01_local_0_shard_00002368_processed.jsonl/45931 | calendar of events
Algonquin Park
“Moose” with Rick Stronks
Oxtongue Lake Community Centre
3987 ON-60
Dwight, ON P0A 1H0
By Donation
Oxtongue Lake
Rick Stronks – Fifty-three species of non-domestic mammals have been recorded within the boundaries of Algonquin Provincial Park and of these, one of the largest and most impressive is the Moose. Algonquin is unequalled in Ontario, perhaps even in North America, as a location for seeing Moose. Come and hear Chief Park Naturalist, Rick Stronks as he shares everything “Moose”!
“An Evening With… Summer Series” at the Oxtongue Lake Community Centre
Every other Wednesday from July 5 to August 30, 2017 starting at 7 p.m. Come out to hear a special guest speaker from the area talking about wildlife, local history, their travels and a myriad of interesting topics. Admission is by donation. Refreshments provided. Hosted by the Oxtongue Lake Community Centre Committee & friends. All proceeds to Community Centre betterment.
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/45934 | News Flash
Guess what? I just figured out that this whole write a post in November thing is not an original idea thought up by Jen that was then copied by Speaker which was then copied by me (and several others). Turns out that WordPress is talking about it like it’s some sort of thing, like, you know, my idea of writing a novel in a month or whatever. Good thing that’s not taken.
They’re calling it NaBloPoMo which is not nearly as cool as Honey Boo Boo whatsit or Blogvemberfester, or whatever our name was. NaBloPoMo sounds like the sound I make when I eat too much Taco Bell and have to go throw up.
Well, now I’m just bummed, because here I thought Jen (of Jen and Tonic!) had this fabulous idea and like, she and Speaker (of Speaker7!) and I were sort of The Three Musketeers. Not the candy bar, the three guys with the matching smocks and the swords. Only we’d be the three gals and have way better fashion sense. But now that’s all gone to hell. Thanks a lot, WordPress, for ruining what was left of my innocence after 50 Shades destroyed 95 percent of my soul.
The three musketeers . . . wait a minute.
But all is not lost. You see, WordPress and . . . wtf, BlogHer is doing this too? What? We’re in with the mommy bloggers? Crap in a hat, guys. Nevermind. We are still original here, because most of these people have rules and stuff for their blog challenges. Like that there should be real posts or something. At least I’m guessing that because WordPress is a pain like that. You know, like don’t try to bait us to your blog by putting the crappy challenge du jour in your tags. Killjoys.
But we laugh in the face of rules. We say “vagina” and call senators “turdface”. We write posts without pictures of food or recipes for cookies. We put little balloons over photos and have politicians tell everyone they’re tools. We explain why people are stupid and vote stupidly (not that I’m saying how you should vote or anything but for crying out loud not Republican). We put squirrels in our posts. We review idiot books about buttplugs. This is edgy stuff, guys.
That’s right, WordPress. We’re a team. Well, except I don’t have my blue sticker yet. I just thought I’d point that out, since you seem to have not noticed my blog out of the bazillions of other blogs. Sad Pony is sad about this. He told me I should put a My Little Pony horsehead™ in your inbox. He’s been through a lot, sorry.
Anyway, there was a point here. I forget. Crap. Look at that! Squirrel!
23 responses
1. NaBloPoMo sounds like a sandwich you can get a state fair.
1. Which would have the same effect as the Taco Bell, I’m sure.
2. Hmm – sounds kind of delicious.
And I think I’m sad that I apparently cannot expect cookie recipes… *siiiiiiiiiigh*
1. Well, I could give you one, but it would be from the Pillsbury Dough Log wrapper which I think is technically considered a no-no, at least if they find out. Cookies sound good.
2. Love the Taco Bell sound reference. Sounds like a PoBoy sammich to me, and every time I see a Nanowrimo post, I think of Mork and Mindy. Nanoo nanoo…
1. Hey, me too! Ah, Mork. Back when Robin Williams was only mildly insane.
3. Of course, I love the squirrel.
1. The squirrel has been really awesome filling in for Sad Pony.
4. I’m a little sad-faced. I thought you, Speaker and Jen had become blogging pioneers, gone where no blogger has gone before and planted a flag. Squirrel makes it a little better. Oh, and please don’t kill My Little Pony.
1. I know. It’s like when I first visited Austin, and I planted a flag, and turned out, someone else had already claimed it. Can you believe that? And here I put down my flag and everything. I was going to rename it AliceLand.
I keep telling Sad Pony to stop looking at My Little Pony that way.
5. You are hilarious even when you don’t have a point!
Hey the squirrel is back! I love that guy.
1. Thank you! Good thing, since I rarely have a point. Thank goodness for squirrel – he’s a good distraction.
6. You are crazy, randomly funny! My Little Pony horsehead…genius!
1. Thank you. Although Barbie heads are actually much easier to pop off. My friends and I used to do that because we were too lazy to change our Barbies’ clothes.
7. Is there an original thought left to be had in this world? Doubtful!
1. I am a true original. First off, who else could have ever thought of my name, huh? Totally original.
8. I don’t have a blue sticker yet either!! So how about We’re still in the cool kids club??
1. I like that idea. If you go over to Clown on Fire he has a sticker that says “Not Freshly Pressed” from back when he was a rebel instead of selling out to The Man. 😀
9. That wretched squirrel gets everywhere, doesn’t it?
1. Yes! Once it got in my boss’s office and maintenance chased it around and grabbed its tail and tore all the fur off the tail before catching it. Then they’d see it around, this hairless tailed squirrel, and they knew that was the offiical library squirrel. Wait, okay, that must have been his cousin or something.
10. Crap in a hat, Killjoy! My God!! What do they think they’re doing is right? Whazzup? Where’s the sad pony? You guys need a name for your club. That’s what I think. Oh, and a badge maybe for your club.
1. I should totally ask Jen, who is master of coming up with band names. Like “Careless Butt Whisperer.” Also, according to her latest post, we are all lesbians, so that might be an excellent name. Except I don’t really want to whisper to anyone’s butt. I will have to think more on this.
And yes, someone needs to make a badge.
1. Hey, I know…what about a contest?! You know, to come up with your name.
Leave a Reply to aliceatwonderland Cancel reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/45950 | resurrection bay
Resurrection North Campground, Seward, Alaska
If you ever get an RV and decide to drive around Alaska, make sure you stop at the Resurrection North Campground in Seward, Alaska. You can pull right up next to Resurrection Bay. You’ll thank me later.
(Not to be too morbid, but I have it written in my will that half of my ashes should be spread in Resurrection Bay.) |
global_01_local_0_shard_00002368_processed.jsonl/45964 | 13 augustus 2016
New version of the PhotoSwipe skin
Changes in this new version 1.3.0 of the PhotoSwipe skin:
• You can now select an hover scale effect for the thumbnails, by selecting a 'Thumbnail hover scale factor' on the 'Index page' / 'Thumbnails' tab.
• It is now possible to hide the footer fields in folder albums.
• Check-mark "Use 'Tap image' to start/stop Slide Show on mobile devices" added to the Slide page settings.
• The Footer fields are now put in a group-panel.
• It is now possible to enter one link in a footer field with code: [link text](link URL). If the link URL is followed by a '^' character, like '...NL.html^)' the link is opened in a new window.. For more details open the manual.
• You can use this code too to enter one link in the image description.
• Use this code too in the album description to enter one or more links in the album description, like is done in the Sample album.
• Problem with orientation change on an iPhone solved.
• It is now also possible to define the Hyper text mouse over color.
Changes in version 1.2.8:
• Sharing via Whatsapp is now possible on an iPhone or on Android phones.
• Via a new check-mark 'Hide comment at the bottom line' it is now possible to hide the image description below the slide page image.
• If the 'Show never' option is selected in the 'Top row of buttons' on the Index page / General tab, the top buttons are always hidden and no longer used code of the #nav bar html- and css-code will be removed. The settings window code is also omitted. This is done to avoid problems in embedded albums.
• The Index page / Footer tab has been extended with a new check-mark 'Remove footer code, to avoid conflicts in embedded albums.'
Changes in version 1.2.7:
• If the resolution of the screen was bigger than the photo size, the slide was closed on a PC if the user did click in the photo, this has been corrected.
• If on the Slide page settings check-mark 'Use same colors and/or background image as index page' was cleared, the text color as defined in the 'Slide appearance' group had no effect. This has been corrected.
• The 'Special' Play and Pause buttons adapted for PhotoSwipe.
• Shadow code for theme image corrected. If you select shadow for the theme image, don't use a width of 100% because in that case you see no shadow at the right side; use 98% instead.
• It is now also possible to share a slide page on Google+
• It now possible to show the contents of the jAlbum Explore Title field in the upper left corner of a slide after the optional counter. For a description see Help for PhotoSwipe Slide page settings and to see an example open the PhotoSwipe Sample album.
• The filename can now be displayed instead of the Title field or after the Title field in the upper left corner with or without file extension in the original format, so with spaces, brackets etc.
Changes in version 1.2.6:
• A number of text boxes for integers have been replaced by spinners.
• The equivalent 35mm focal length is now also displayed in the EXIF data (if available) and text "Flash did not fire" replaced by "no".
• The Facebook check-mark on the General settings has been removed and a Facebook check-mark has been added to the index/General settings page and to the Slide settings page.
• Problem with Facebook share link on an iPad solved. Facebook SDK updated to v2.7
• The Facebook share dialog of an enlarged image shows now the image and the image description in Facebook.
• New code to display the location with the new Google Maps SDK, the map type has been removed, because it was no longer working in the new Google Maps SDK.
• Twitter tweets corrected: the Exif info is no longer tweeted.
• Error in the Pin-it share action repaired.
• You can now hide the EXIF info below an enlarged image by clicking in the EXIF text (works only on a PC).
• If you did select 'Show Exif info below the slide image: Always', it is still possible to hide the Exif data for the current slide via the menu, but for the next slide the Exif data is again automatically displayed. |
global_01_local_0_shard_00002368_processed.jsonl/45988 | HUBweek 2017 For PC / Windows 7/8/10 / Mac – Free Download
HUBweek 2017 For PC
Your go-to resource for all things HUBweek, a festival for the future, taking place in Boston from October 10-15, 2017. Founded by The Boston Globe, Harvard University, MIT and Massachusetts General Hospital, HUBweek is your opportunity to experience the ideas and innovators shaping our tomorrow. Download the app to discover upcoming events, connect with the people and organizations making an impact, and access resources to get the most out of the week.
How to download and run HUBweek 2017 on your PC and Mac
HUBweek 2017 For PC can be easily installed and used on a desktop computer or laptop running Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10 and a Macbook, iMac running Mac OS X. This will be done using an Android emulator. To install HUBweek 2017 For PC, we will use BlueStacks app player. The method listed below is set to help you get HUBweek 2017 For PC. Go ahead and get it done now.
HUBweek 2017 For PCDownload and use HUBweek 2017 on your PC & Mac using an Android Emulator.
More Details
Download Links For HUBweek 2017:
Download: Bluestacks Android Emulator
Download: HUBweek 2017 (Play Store)
More From Us: Noticias Águila-Local&Breaking.Tendencia.Vídeo.GIF For PC / Windows 7/8/10 / Mac – Free Download
Step to Step Guide / HUBweek 2017 For PC:
3. Once everything is done, just open the Market in Play Store and Search for the ‘HUBweek 2017’.
4. Tap the first result and tap install.
6. That’s all Enjoy!
HUBweek 2017 by Swoogo,Google play Logo
See App in Play Store
Also Read: Shadowblood For PC / Windows 7/8/10 / Mac – Free Download
About Polio Fernandes 41571 Articles
Be the first to comment
Leave a Reply
Your email address will not be published. |
global_01_local_0_shard_00002368_processed.jsonl/45993 | Information for "Victor Laxman"
Basic information
Display titleVictor Laxman
Default sort keyVictor Laxman
Page length (in bytes)1,676
Page ID4178
Page content languageen - English
Page content modelwikitext
Indexing by robotsAllowed
Number of redirects to this page0
Counted as a content pageYes
Page protection
EditAllow all users (infinite)
MoveAllow all users (infinite)
View the protection log for this page.
Edit history
Page creatorDariusGalaxyz (talk | contribs)
Date of page creation13:17, 10 November 2019
Latest editorAlahmnat (talk | contribs)
Date of latest edit15:53, 20 November 2019
Total number of edits9
Total number of distinct authors2
Recent number of edits (within past 90 days)9
Recent number of distinct authors2
Page properties
Hidden category (1)
This page is a member of 1 hidden category:
Transcluded templates (9)
Templates used on this page: |
global_01_local_0_shard_00002368_processed.jsonl/45994 | Skip to main content Skip to search Skip to search results
United States. Indian Claims Commission
Found in 1 Collection or Record:
Robert Leland Papers
Identifier: NC1035
Abstract Material in the collection is exclusively concerned with issues of American Indians, mainly the Pyramid Lake Paiute Tribe. Correspondence, notes, reports, legal documents, printed material, tribal records and maps relate to Pyramid Lake Paiute tribal concerns including water, economic development and Indian claims. |
global_01_local_0_shard_00002368_processed.jsonl/46022 | In July 1994, the comet Shoemaker-Levy 9 (D/1993 F2) tidally fragmented and these fragments collided into Jupiter, as per the image below.
enter image description here
Image source
The question is, what mechanisms resulted in these small fragments causing such large explosions in the Jovian clouds?
Shoemaker Levy 9 was estimated to have released kinetic energy equivalent to 300 gigatons of TNT. That is 1.255×1021 J. This release through friction and compression was sufficient to heat the atmosphere to 4000K at first. That in turn should probably be enough to break down the molecular hydrogen and methane, releasing further energy. But that's only my guess. The heating from the impact alone should make a huge fireball.
Fragment Size and Mass Estimates
Galileo observations
An important factor is that the comet had fallen through Jupiter's gravitational field, picking up Jupiter's escape velocity of about 60 $km/s$ in addition to whatever velocity it had as it approached the Jupiter system. This paper gives detailed estimates of the sizes of all the fragments at impact. Three of them are estimated at 1km diameter or more, so they were not really small.
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/46048 | Loading... Please wait...
Our Ingredients
We use no added preservatives and only kitchen-fresh ingredients in our recipes. Each Cookie Pie is made fresh, then shipped to you. For maximum freshness and quality, they can stay at room temperature for approximately 7-10 days. If you don’t plan on eating your Cookie Pie right away, we recommend refrigeration (for up to 4 weeks) or freezing them (for up to 6 months.) Our ingredients are carefully selected to have low moisture content which helps extend the shelf life.
Wholesome and pure ingredients go into each one of Barbara’s Cookie Pies such as unbleached and unbromated flour, pure creamery butter (not oil), pure chocolate (not “coatings”), whole eggs, pure vanilla extract (not artificial flavors), premium preserves, fresh nuts and so on - overall the best quality ingredients we can find. As a small business, it can be challenging to obtain these products cost effectively, but after numerous kitchen tests and tastings, we taste the difference and hope you will too.
Allergy Warning: Cookie Pies may contain chocolate, egg, nuts, dairy and wheat.
There are no products in this category.
Sign up to our newsletter |
global_01_local_0_shard_00002368_processed.jsonl/46060 | Free Transparent Pixel Pack!
Derived from an excellent Kenney’s Pixel Pack, Free Transparent Pixel Pack is the ultimate (and much requested) modification of the original.
This package comes with 49 FULLY TRANSPARENT pixels which you can use to build anything you desire! As with the original, if you need more transparent pixels, you simply download the package again. Will you create the next indie gaming hit?
Unlike Kenney’s, this pack is fully compatible with all modern game engines: it has Unreal Engine 4 support, Unity support (even the beta versions), as well as Godot / Game Maker and others!
About the author |
global_01_local_0_shard_00002368_processed.jsonl/46071 |
• It’s a mathematical abstraction, and the equations work out. Deal with it.
• It’s used in advanced physics, trust us. Just wait until college.
Gee, what a great way to encourage math in kids! Today we’ll assault this topic with our favorite tools:
And our secret weapon: learning by analogy. We’ll approach imaginary numbers by observing its ancestor, the negatives. Here’s your guidebook:
imaginary number properties
It doesn’t make sense yet, but hang in there. By the end we’ll hunt down i and put it in a headlock, instead of the reverse.
Video Walkthrough:
Really Understanding Negative Numbers
Negative numbers aren’t easy. Imagine you’re a European mathematician in the 1700s. You have 3 and 4, and know you can write 4 – 3 = 1. Simple.
But what about 3-4? What, exactly, does that mean? How can you take 4 cows from 3? How could you have less than nothing?
Negatives were considered absurd, something that “darkened the very whole doctrines of the equations” (Francis Maseres, 1759). Yet today, it’d be absurd to think negatives aren’t logical or useful. Try asking your teacher whether negatives corrupt the very foundations of math.
What happened? We invented a theoretical number that had useful properties. Negatives aren’t something we can touch or hold, but they describe certain relationships well (like debt). It was a useful fiction.
Rather than saying “I owe you 30” and reading words to see if I’m up or down, I can write “-30” and know it means I’m in the hole. If I earn money and pay my debts (-30 + 100 = 70), I can record the transaction easily. I have +70 afterwards, which means I’m in the clear.
The positive and negative signs automatically keep track of the direction — you don’t need a sentence to describe the impact of each transaction. Math became easier, more elegant. It didn’t matter if negatives were “tangible” — they had useful properties, and we used them until they became everyday items. Today you’d call someone obscene names if they didn’t “get” negatives.
But let’s not be smug about the struggle: negative numbers were a huge mental shift. Even Euler, the genius who discovered e and much more, didn’t understand negatives as we do today. They were considered “meaningless” results (he later made up for this in style).
It’s a testament to our mental potential that today’s children are expected to understand ideas that once confounded ancient mathematicians.
Enter Imaginary Numbers
Imaginary numbers have a similar story. We can solve equations like this all day long:
\displaystyle{x^2 = 9}
The answers are 3 and -3. But suppose some wiseguy puts in a teensy, tiny minus sign:
\displaystyle{x^2 = -9}
Uh oh. This question makes most people cringe the first time they see it. You want the square root of a number less than zero? That’s absurd! (Historically, there were real questions to answer, but I like to imagine a wiseguy.)
It seems crazy, just like negatives, zero, and irrationals (non-repeating numbers) must have seemed crazy at first. There’s no “real” meaning to this question, right?
Wrong. So-called “imaginary numbers” are as normal as every other number (or just as fake): they’re a tool to describe the world. In the same spirit of assuming -1, .3, and 0 “exist”, let’s assume some number i exists where:
\displaystyle{i^2 = -1}
That is, you multiply i by itself to get -1. What happens now?
Well, first we get a headache. But playing the “Let’s pretend i exists” game actually makes math easier and more elegant. New relationships emerge that we can describe with ease.
You may not believe in i, just like those fuddy old mathematicians didn’t believe in -1. New, brain-twisting concepts are hard and they don’t make sense immediately, even for Euler. But as the negatives showed us, strange concepts can still be useful.
I dislike the term “imaginary number” — it was considered an insult, a slur, designed to hurt i‘s feelings. The number i is just as normal as other numbers, but the name “imaginary” stuck so we’ll use it.
Visual Understanding of Negative and Complex Numbers
As we saw last time, the equation $x^2 = 9$ really means:
\displaystyle{1 \cdot x^2 = 9}
\displaystyle{1 \cdot x \cdot x = 9}
What transformation x, when applied twice, turns 1 to 9?
The two answers are “x = 3” and “x = -3”: That is, you can “scale by” 3 or “scale by 3 and flip” (flipping or taking the opposite is one interpretation of multiplying by a negative).
Now let’s think about $x^2 = -1$, which is really
\displaystyle{1 \cdot x \cdot x = -1}
What transformation x, when applied twice, turns 1 into -1? Hrm.
• We can’t multiply by a positive twice, because the result stays positive
• We can’t multiply by a negative twice, because the result will flip back to positive on the second multiplication
But what about… a rotation! It sounds crazy, but if we imagine x being a “rotation of 90 degrees”, then applying x twice will be a 180 degree rotation, or a flip from 1 to -1!
Imaginary Number Rotation
Yowza! And if we think about it more, we could rotate twice in the other direction (clockwise) to turn 1 into -1. This is “negative” rotation or a multiplication by -i:
imaginary number Negative Rotation
If we multiply by -i twice, the first multiplication would turn 1 into -i, and the second turns -i into -1. So there’s really two square roots of -1: i and -i.
This is pretty cool. We have some sort of answer, but what does it mean?
• i is a “new imaginary dimension” to measure a number
• i (or -i) is what numbers “become” when rotated
• Multiplying i is a rotation by 90 degrees counter-clockwise
• Multiplying by -i is a rotation of 90 degrees clockwise
• Two rotations in either direction is -1: it brings us back into the “regular” dimensions of positive and negative numbers.
Numbers are 2-dimensional. Yes, it’s mind bending, just like decimals or long division would be mind-bending to an ancient Roman. (What do you mean there’s a number between 1 and 2?). It’s a strange, new way to think about math.
We asked “How do we turn 1 into -1 in two steps?” and found an answer: rotate it 90 degrees. It’s a strange, new way to think about math. But it’s useful. (By the way, this geometric interpretation of complex numbers didn’t arrive until decades after i was discovered).
Also, keep in mind that having counter-clockwise be positive is a human convention — it easily could have been the other way.
Finding Patterns
Let’s dive into the details a bit. When multiplying negative numbers (like -1), you get a pattern:
Since -1 doesn’t change the size of a number, just the sign, you flip back and forth. For some number “x”, you’d get:
• x, -x, x, -x, x, -x…
This idea is useful. The number “x” can represent a good or bad hair week. Suppose weeks alternate between good and bad; this is a good week; what will it be like in 47 weeks?
\displaystyle{x \cdot (-1)^{47} = x \cdot -1 = -x}
So -x means a bad hair week. Notice how negative numbers “keep track of the sign”: we can throw $(-1)^{47}$ into a calculator without having to count (”Week 1 is good, week 2 is bad… week 3 is good…“). Things that flip back and forth can be modeled well with negative numbers.
Ok. Now what happens if we keep multiplying by $i$?
\displaystyle{1, i, i^2, i^3, i^4, i^5}
Very funny. Let’s reduce this a bit:
• $1 = 1$ (No questions here)
• $i = i$ (Can’t do much)
• $i^2 = -1$ (That’s what i is all about)
• $i^3 = (i \cdot i) \cdot i = -1 \cdot i = -i$ (Ah, 3 rotations counter-clockwise = 1 rotation clockwise. Neat.)
• $i^4 = (i \cdot i) \cdot (i \cdot i) = -1 \cdot -1 = 1$ (4 rotations bring us “full circle”)
• $i^5 = i^4 \cdot i = 1 \cdot i = i$ (Here we go again…)
Represented visually:
imaginary number cycle
We cycle every 4th rotation. This makes sense, right? Any kid can tell you that 4 left turns is the same as no turns at all. Now rather than focusing on imaginary numbers ($i$, $i^2$), look at the general pattern:
• X, Y, -X, -Y, X, Y, -X, -Y…
Like negative numbers modeling flipping, imaginary numbers can model anything that rotates between two dimensions “X” and “Y”. Or anything with a cyclic, circular relationship — have anything in mind?
‘Cos it’d be a sin if you didn’t. There’ll de Moivre be more in future articles. [Editor’s note: Kalid is in electroshock therapy to treat his pun addiction.]
Understanding Complex Numbers
There’s another detail to cover: can a number be both “real” and “imaginary”?
You bet. Who says we have to rotate the entire 90 degrees? If we keep 1 foot in the “real” dimension and another in the imaginary one, it looks like this:
imaginary number i plus i
We’re at a 45 degree angle, with equal parts in the real and imaginary (1 + i). It’s like a hotdog with both mustard and ketchup — who says you need to choose?
In fact, we can pick any combination of real and imaginary numbers and make a triangle. The angle becomes the “angle of rotation”. A complex number is the fancy name for numbers with both real and imaginary parts. They’re written a + bi, where
• a is the real part
• b is the imaginary part
imaginary number a plus bi
Not too bad. But there’s one last question: how “big” is a complex number? We can’t measure the real part or imaginary parts in isolation, because that would miss the big picture.
Let’s step back. The size of a negative number is not whether you can count it — it’s the distance from zero. In the case of negatives this is:
\displaystyle{\text{Size of } \ -x = \sqrt{(-x)^2} = |x|}
Which is another way to find the absolute value. But for complex numbers, how do we measure two components at 90 degree angles?
It’s a bird… it’s a plane… it’s Pythagoras!
Geez, his theorem shows up everywhere, even in numbers invented 2000 years after his time. Yes, we are making a triangle of sorts, and the hypotenuse is the distance from zero:
\displaystyle{\text{Size of } \ a + bi = \sqrt{a^2 + b^2}}
Neat. While measuring the size isn’t as easy as “dropping the negative sign”, complex numbers do have their uses. Let’s take a look.
A Real Example: Rotations
We’re not going to wait until college physics to use imaginary numbers. Let’s try them out today. There’s much more to say about complex multiplication, but keep this in mind:
Let’s take a look. Suppose I’m on a boat, with a heading of 3 units East for every 4 units North. I want to change my heading 45 degrees counter-clockwise. What’s the new heading?
imaginary number example
Some hotshot will say “That’s simple! Just take the sine, cosine, gobbledegook by the tangent… fluxsom the foobar… and…“. Crack. Sorry, did I break your calculator? Care to answer that question again?
Let’s try a simpler approach: we’re on a heading of 3 + 4i (whatever that angle is; we don’t really care), and want to rotate by 45 degrees. Well, 45 degrees is 1 + i (perfect diagonal), so we can multiply by that amount!
imaginary number rotation example
Here’s the idea:
• Original heading: 3 units East, 4 units North = 3 + 4i
• Rotate counter-clockwise by 45 degrees = multiply by 1 + i
If we multiply them together we get:
(3 + 4i) \cdot (1 + i) &= 3 + 3i + 4i + 4i^2 \\ &= 3 + 7i \hspace{8mm} + 4(-1) \\ &= -1 + 7i
So our new orientation is 1 unit West (-1 East), and 7 units North, which you could draw out and follow.
But yowza! We found that out in 10 seconds, without touching sine or cosine. There were no vectors, matrices, or keeping track what quadrant we are in. It was just arithmetic with a touch of algebra to cross-multiply. Imaginary numbers have the rotation rules baked in: it just works.
Even better, the result is useful. We have a heading (-1, 7) instead of an angle (atan(7/-1) = 98.13, keeping in mind we’re in quadrant 2). How, exactly, were you planning on drawing and following that angle? With the protractor you keep around?
No, you’d convert it into cosine and sine (-.14 and .99), find a reasonable ratio between them (about 1 to 7), and sketch out the triangle. Complex numbers beat you to it, instantly, accurately, and without a calculator.
If you’re like me, you’ll find this use mind-blowing. And if you don’t, well, I’m afraid math doesn’t toot your horn. Sorry.
Trigonometry is great, but complex numbers can make ugly calculations simple (like calculating cosine(a+b) ). This is just a preview; later articles will give you the full meal.
Aside: Some people think “Hey, it’s not useful to have North/East headings instead of a degree angle to follow!”
Really? Ok, look at your right hand. What’s the angle from the bottom of your pinky to the top of your index finger? Good luck figuring that out on your own.
With a heading, you can at least say “Oh, it’s X inches across and Y inches up” and have some chance of working with that bearing.
Complex Numbers Aren’t
That was a whirlwind tour of my basic insights. Take a look at the first chart — it should make sense now.
There’s so much more to these beautiful, zany numbers, but my brain is tired. My goals were simple:
• Convince you that complex numbers were considered “crazy” but can be useful (just like negative numbers were)
• Show how complex numbers can make certain problems easier, like rotations
If I seem hot and bothered about this topic, there’s a reason. Imaginary numbers have been a bee in my bonnet for years — the lack of an intuitive insight frustrated me.
Now that I’ve finally had insights, I’m bursting to share them. But it frustrates me that you’re reading this on the blog of a wild-eyed lunatic, and not in a classroom. We suffocate our questions and “chug through” — because we don’t search for and share clean, intuitive insights. Egad.
But better to light a candle than curse the darkness: here’s my thoughts, and one of you will shine a spotlight. Thinking we’ve “figured out” a topic like numbers is what keeps us in Roman Numeral land.
There’s much more complex numbers: check out the details of complex arithmetic. Happy math.
Epilogue: But they’re still strange!
I know, they’re still strange to me too. I try to put myself in the mind of the first person to discover zero.
Zero is such a weird idea, having “something” represent “nothing”, and it eluded the Romans. Complex numbers are similar — it’s a new way of thinking. But both zero and complex numbers make math much easier. If we never adopted strange, new number systems, we’d still be counting on our fingers.
I repeat this analogy because it’s so easy to start thinking that complex numbers aren’t “normal”. Let’s keep our mind open: in the future they’ll chuckle that complex numbers were once distrusted, even until the 2000’s.
If you want more nitty-gritty, check out wikipedia, the Dr. Math discussion, or another argument on why imaginary numbers exist.
Other Posts In This Series
1. A Visual, Intuitive Guide to Imaginary Numbers
2. Intuitive Arithmetic With Complex Numbers
3. Understanding Why Complex Multiplication Works
4. Intuitive Guide to Angles, Degrees and Radians
5. Intuitive Understanding Of Euler's Formula
6. An Interactive Guide To The Fourier Transform
7. Intuitive Understanding of Sine Waves
8. An Intuitive Guide to Linear Algebra
9. A Programmer's Intuition for Matrix Multiplication
10. Imaginary Multiplication vs. Imaginary Exponents |
global_01_local_0_shard_00002368_processed.jsonl/46073 | Chapter 14, Verse 6
तत्र सत्वं निर्मलत्वात्प्रकाशकमनामयम् | सुखसङ्गेन बध्नाति ज्ञानसङ्गेन चानघ ॥6॥
tatra sattvaṁ nirmalatvāt prakāśhakam anāmayam sukha-saṅgena badhnāti jñāna-saṅgena chānagha
Word Meanings
tatra—amongst these; sattvam—mode of goodness; nirmalatvāt—being purest; prakāśhakam—illuminating; anāmayam—healthy and full of well-being; sukha—happiness; saṅgena—attachment; badhnāti—binds; jñāna—knowledge; saṅgena—attachment; cha—also; anagha—Arjun, the sinless one
Among them, sattva, being pure, [Nirmala, pure-transparent, i.e., capable of resisting any form of ignorance, and hence as illuminator, i.e. a revealer of Consciousness.] is an illuminator and is harmless. O sinless one, it binds through attachment to happiness and attachment to knowledge. |
global_01_local_0_shard_00002368_processed.jsonl/46076 | 5 Bible verses about Light Yoke (KJ2000)
Never miss a post
5 Bible Verses about Light Yoke
Most Relevant Verses
1 Kings 12:4
Your father made our yoke grievous: now therefore make you the grievous service of your father, and his heavy yoke which he put upon us, lighter, and we will serve you.
1 Kings 12:9
And he said unto them, What counsel give you that we may answer this people, who have spoken to me, saying, Make the yoke which your father did put upon us lighter?
1 Kings 12:10
And the young men that were grown up with him spoke unto him, saying, Thus shall you speak unto this people that spoke unto you, saying, Your father made our yoke heavy, but you make it lighter unto us; thus shall you say unto them, My little finger shall be thicker than my father's loins.
Bible Theasaurus |
global_01_local_0_shard_00002368_processed.jsonl/46086 | In fluid in a glass it mentions using a volume absorption node. Below are the settings suggested for red wine in the answer from @gandalf.
enter image description here
Any clues re what settings, particularly density, to use for whiskey?
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00002368_processed.jsonl/46115 | HolyJit: A New Hope
tl;dr: We believe there is a safer and easier way of writing a Jit.
Current State
Today, all browsers’ Jits share a similar design. This design makes extending the language or improving its performance time-consuming and complex, especially while avoiding security issues.
For instance, at the time of this writing, our Jit relies upon ~15000 lines of carefully crafted, hand-written assembly code (~36000 in Chromium’s v8). The Jit directory represents 5% of all the C++ code of Firefox, and contains 3 of the top 20 largest files of Firefox, all written by hand.
Interestingly, these files all contain code that is derived by hand from the Interpreter and a limited set of built-in functions of the JavaScript engine. But why do it by hand, when we could automatize the process, saving time and risk? HolyJit is exploring this possibility.
Introducing HolyJit (prototype)
This week, during the JS Team meetup, we have demonstrated the first prototype of a Rust meta-Jit compiler, named HolyJit. If our experiment proves successful, we believe that employing a strategy based on HolyJit will let us avoid many potential bugs and let us concentrate on strategic issues. This means more time to implement JavaScript features quickly and further improve the speed of our Jit.
HolyJit library instrumenting the Rust compiler to add a meta-Jit for Rust code.
For instance, in a recent change, we extended the support of optimizations to Array.prototype.push. What should have been a trivial modification required diving into safety-critical code and adding 135 lines of code, and reading even more code to check that we were not accidentally breaking invariants.
With HolyJit, what should have been a trivial change would effectively have been a trivial change. The following change to a hypothetical JS Jit built with HolyJit does exactly the same thing as the previous patch, i.e. allowing the Jit to inline the Array.prototype.push function when it is being called with more than one argument.
fn array_push(args: &CallArgs) -> Result<JSValue, Error> {
- jit_inline_if!(args.len() == 1);
+ jit_inline_if!(args.len() >= 1);
By making changes self-contained and simple, we hope that HolyJit will improve the safety of our Jit engine, and let us focus on optimizations.
HolyJit Repository: https://github.com/nbp/holyjit
Thanks to David Teller, Jason Orendorff, Sean Stangl, Jon Coppeard for proof reading this blog post.
11 responses
Post a comment
1. Robert Monfera wrote on :
Sounds intriguing but I don’t fully understand how this approach can lead to competitive performance – if you can combine otherwise interpreted functions A and B, then their automatic combination, even if inlined or running in native code, may not be as efficient as what’s a result of data flow analysis, loop unrolling and a million other optimizations.
A hypothetical example: the way transducers (see Rich Hickie talk, Strange Loop) work is such that, when various operations are plumbed together (e.g. map, filter, reduce, map again…) there doesn’t have to be big arrays created temporarily, as would be needed by native [].map etc. functions. Now, inspired by that, a JIT may be smart enough to recognize a chain of `someArray.map(…).filter(…).reduce(…).map(…)` as safe for pipelining through individual elements, without having to create as many large arrays as the native interpretation would. Of course data flow analysis is needed to check if it’s safe to do so. It’s a huge win to combine functions this way and just one example (probably hypothetical).
Now, how could an automatic solution, as I understand from the gh page, arrive at an optimization like this? Will there be a full-blown optimizing Rust compiler bundled in desktop and mobile Firefox browsers? What am I missing?
1. Nicolas B. Pierron wrote on :
This approach can lead to competitive performance because the amount of work needed to provide the same optimization should require less efforts. Thus, this would free some developer time to do more optimizations.
Currently this project is only at the prototype stage, and there is no plan for adding any “Deforestation” optimizations to the optimizing compiler yet. The main idea at the moment is to guide the compiler with Rust macros, annotating the code, such as the jit_inline_if macro mentioned in this article.
1. Rudolf Olah wrote on :
You’re optimizing for development time and this makes a lot of sense. Each line of code adds time to the code review, and multiply that by 3-4 developers and you have yourself a time-sink that’s so bad that there are now startups that want to outsource code reviews!
This makes a lot of sense and you’re getting a lot of value out of this. 1 line of code to review vs 135 translates into less developer-hours spent on review meaning more time spent on other issues to fix.
Very cool project!
2. Steveo wrote on :
It doesn’t seem to add up, I believe Monfera was referring to runtime performance, and you are responding to a question about development time.
One has to think asm was an architectural decision. With the browser being central to almost everything, performance is critical. To assume that matching the performance of the asm compiler and its output executable code are easy things, is like asserting P=NP, gonna need you to understand the question first of all, and why it is relevant, then we can work on hope (hope for a slower browser for everyone?)
Props to the asm team FYI, an amazing job, if I’m misunderstanding this blog post my apologies, but it sounds like Pierron thinks what you are doing is hopeless, and that is rediculous.
1. Nicolas B. Pierron wrote on :
Indeed, I forgot to answer the first part of the question.
The way we gain performances in SpiderMonkey’s JIT, is by adding guards / constraints on some values which are flowing in the graph.
The idea of this experiment, would be to provide the same guards as annotations, and keep annotating the code until the optimizer can generate the same code we would have done by hand.
The next stage of this experiment is actually to see how many annotations are required to provide the same amount of optimizations on a dynamic language.
What we hope to observe, is that the maintenance of these annotations would be easier than the maintenance of the equivalent generated code.
2. Stephen Chung wrote on :
The difference is like using yacc (or bison or whatever) to build a compiler parser vs. writing the parser out all by hand.
3. Cristian Vasile wrote on :
How is this different of BEAMJIT the JIT designed for Erlang/Elixir VM?
” The core parts of BEAMJIT are synthesized from the C source code of BEAM, the reference Erlang abstract machine”
1. Nicolas B. Pierron wrote on :
HolyJit experiment share the same intent as BEAMJIT.
Except for the language, one of the difference with BEAMJIT is that it relies on LLVM to build a JIT compiler, whereas HolyJit has its own back-end which might be replaced by Cretonne in the future.
This is not yet a concern but the binary size might be a deal breaker if the HolyJit experiment graduates.
4. samlh wrote on :
Some other meta-jit implementations:
1. PyPy[1] on top of RPython[2] (low-level Python)
2. Truffle/Graal [3] on top of Java
Rust is an especially interesting host language for a metajit, as it has a reasonably low-level IR (MIR), and unlike the other meta-jit host languages I know of does not use garbage collection.
I am very interested to see how this turns out!
[1] http://doc.pypy.org/en/latest/introduction.html
[2] http://rpython.readthedocs.io/en/latest/index.html#index
[3] https://github.com/graalvm/
1. Cristian Vasile wrote on :
1. samlh wrote on :
Interesting – it seems that one relies on the Java JIT inlining a tree of lambdas generated by an AST compiler. I can see how that would be an easy way to compile to the JVM without having to write the bytecode directly. I believe Truffle does something similar for compilation, though I believe it uses a tree of method calls instead, and some extra work to ensure the inlining works well.
I don’t know the creator has gotten to the point of worrying about specializing for runtime values and falling back to more general versions on guard failure – that is one of the areas where the Truffle project has spent a fair amount of work.
As I understand it, Truffle does specialization by choosing specialized AST node subclasses based on runtime values, and does fallback by swapping out AST nodes to more general versions on guard failures. I’m sure there are details I’m missing, however.
Still, the Unison runtime seems like a nice waypoint between an interpreter and a specializing JIT, and looks reasonably amenable to implementing specialization later.
Thank you for bringing it to my attention!
Post Your Comment |
global_01_local_0_shard_00002368_processed.jsonl/46121 | National Geographic Society Newsroom
Singing Penis, Hearing Feet Among Nature’s Repurposed Body Parts
Some of us eat with our eyes and talk with our hands. Under the right circumstances, our hearts may even sing. We live in busy times. Even our body parts have to be multitaskers. Some animals go beyond metaphor, and have body parts that actually do double duty. Last week, Weird & Wild reported about...
Last week, Weird & Wild reported about a frog from the Seychelles Islands that hears with its mouth. Here are five other animals with repurposed body parts that serve more than one function. (See “Pictures: Mouth-Birthing Frog to Be Resurrected?“)
Octopi Taste With Their Tentacles
Octopi are kind of Renaissance cephalopod, charming and multitalented. They can hide from their enemies and open jars, are great shots with a water pistol, can mimic their friends, and are able to take arms against a sea of troubles.
octopus picture
A mimic octopus in Sulawesi, Indonesia. Image by Jeffrey Rotman/Corbis
They can also taste with those arms.
The octopus is chemoctactic; it can taste what it touches. Its suction cups have about 200 taste buds per arm, so if it likes something … well, best not to be the something it likes. Those who enjoy octopus sushi should keep in mind that under different circumstances that sucker could have been tasting you back.
Water Scorpion Breathes With Its Tail
If you’ve seen one of these in the swimming pool, you might have thought it was a stick bug that didn’t get the camouflage memo and forgot to stay in the sticks.
Actually, it’s a water scorpion, mostly harmless (unless you’re a mayfly or freshwater shrimp) and not a scorpion at all. It’s an insect with six legs, as opposed to an arachnid, which is an invertebrate with eight. It’s similar in appearance, though, especially its grasping forelimbs that resemble a scorpion’s pincers. Then there’s that tail—that magnificent tail—it breathes through.
The water scorpion’s tail is actually a snorkel, sometimes called a siphon. When the bug pokes this tube up above the surface of the water, air diffuses down the tube into an air bubble the insect carries, held in place with tiny hairs between its forewings and abdomen. It’s kind of like dipping your water bottle below a river’s surface to refill it, only the scorpion is dipping into the air to replenish its supply.
Star-Nosed Mole Feels With Its Nose
Between a set of claws that would make Nosferatu think “gah, get a manicure,” and a nose that looks like someone stuck a Dalek to its face, the star-nosed mole is so weird looking that if you saw it in a sci-fi movie you’d think they’d gone overboard with the effects.
The star-nosed mole’s firework of a proboscis. Photograph by Ken Catania, National Geographci Stock
And yet that firework of a proboscis has exceptional powers. Not only can it smell things underwater (if it sounds easy, you try it), but the mole also uses it like fingers to touch and figure out its surroundings (it’s more or less blind).
With tens of thousands of Eimer’s organs, sophisticated epidermal touch organs, that 22-tentacled schnoz boasts the most sensitive area of skin of any mammal and was the subject of a 2010 study exploring “the molecular basis of mammalian touch,” potentially leading to pain-mediating drugs and therapies.
Great! Just keep it waaaay over there. Okay?
Water Boatman Sings With Its Genitals
Vagina Monologues, you’ve been one-upped. Meet the singing penis.
An insect called the water boatman, not much bigger than a sprinkle on a cupcake, makes a chirping sound by rubbing its penis against its belly, a musical innovation similar to the way male crickets chirp by rubbing their wings together.
Not only does it sing, it’s loud. The water boatman’s musical tackle peaked in experiments at 105 decibels, just a little louder than an outboard motor or a jet flyover at 1,000 feet, making its crotch concerto the loudest sound relative to body size of any animal. (See “World’s Loudest Animals.”)
Perhaps the female of the species wants something that goes to 11.
Elephants Hear With Their Feet
We use the phrase having your “ear to the ground” to mean staying on the alert, but elephants’ hearing is kept to the ground—almost literally—through their feet. Stanford researcher Caitlin O’Connell-Rodwell theorized back in 1992 that elephants communicate through seismic vibrations, and years of research proved the theory true.
elephant picture
Orphan elephants walk through the nursery at the David Sheldrick Wildlife Trust. Photograph by Michael Nichols, National Geographic
Elephants, for example, send warnings to other elephants by trumpeting and stamping the ground; recipients respond in ways such as vacating the area earlier than usual. (Video: “How Elephants ‘Hear’ With Their Feet.”)
An elephant’s feet and trunk are extremely sensitive. Their mock charges, behavior intended to frighten predators, transmit through the ground at a frequency of 20 hertz (the lowest point of human hearing). The vibrations from mock charges can transmit at a distance of up to 20 miles. (See “Elephants Communicate in Sophisticated Sign Language.”)
Sadly, not everyone is sending them good vibrations.
Follow Liz Langley on Facebook and Twitter.
About National Geographic Society
Meet the Author
Liz Langley |
global_01_local_0_shard_00002368_processed.jsonl/46128 | ESP8266 OLED display library release
Shifted Display Fix
More ASCII characters
In this picture you can see its use:
Displaying data from my balcony, measured with the ClimateNode
One last thing…
The new ClimateNode to measure temperature and humidity on
your balcony, basement, bathroom, etc.
Posted by squix78
• Have you updated to the latest version 1.0.1 of the ssd1306 oled library? I extended the char range to the upper ASCII table, where in my oppinion the umlauts reside? How does "not properly" look like? Can you create an issue in the github repository with "new issue"?
• I have also noticed this problem with the "äöåÄÖÅ" characters, however, the display also always shows a "Â" sign in front of the degree sign. This could maybe also be an encoding issue or something like that. I am using a call like this for example: "display.drawString(65 + x, 0 + y, "Tänään");"
• I had troubles with the degree symbol too.
I found the answer in the method SSD1306::utf8ascii(). An initial extended "code switch character" has to be sent before the actual degree symbol.
Here, I declare the degree symbol and then assemble a display string:
char degSymbol[3] = { 0xC2, 0xB0, 0x00 }; // degree symbol(0xB0 or 176) in the extended ascii set
// 0xC2 is shift/table selector character
String comfy = "23";
comfy.concat( degSymbol );
comfy.concat( "C" );
Now comfy prints in the serial terminal as: 23°C
But it displays correctly in drawString(x,y, comfy )
Then I found Dani had explained this in a subsequent post on 12Dec2015 – "ESP8266: Fixing extended ASCII issues in SSD1306 OLED library"
Thank you for this work Dani. It's been put to good use!
1. I noticed that there is no longer support for the "void setFontScale2x2(bool isFontScaling2x2);" method in the library. Why is that and could that be fixed? Thanx for a great piece of code BTW.
• Hi Juho. Looks I missed your question for almost a month. Well in the meantime I have a good answer: I removed it since now you can add font sizes and styles as you want. You can create fonts by using this tool here:
For me the 2×2 font scaling was a bad workaround to have big characters. Now you can use nicely rendered characters in any font that is available. I might extend the tool in the future to use any font you like…
2. Я пытаюсь повторить ваш проект уже 3 недели, но ничего не получается! Мой OLED Display – Sh1106, А Ваши библиотеки с ним не работают! Могли бы Вы Исправить библиотеки так, чтобы они работали с дисплеями Sh1106 и SSD1306? Спасибо. Николай из России.
3. First of all: thank you for making this nice library. It is the only one that lets me use my I2C-based OLED screens on my WeMos D1 Minis. But I have one question: could you add an extra example? A super-simple example with no frames or overlays. To use when you simply want to access and write to the screen from the loop with simple commands?
All the examples I can find includes several frames. And some times I only want a display to show a distance, the time or something else. I am fairly new to arduino coding and all my attempts to simplify the code ends in a black screen…
4. I'd like to second the previous post. I'm trying to pair down your example, but frankly it's a bit over my head. If you can point me to a basic Hello World, it would be greatly appreciated.
I've been searching for a nice ESP/OLED lib and your's looks like it. Not to mention the font converter.
In any case, wonderful work! I bought you a well deserved beer.
Thanks, John
5. To follow up on previous, I did figure out how to do a basic Hello World display (missed display.display :).
It may interest you that your lib seems to work with ATmega chips with a small change. I have it working with the Pro Mini. Basically it's an "#ifdef ESP8266" around the 2 calls to Wire.begin() to not pass the SDA & SCL. Of course there is not much memory left – ~12k with 2 fonts used.
Again, thanks for a great library.
6. Love your work on this library – and it’s fast! How hard would a scrolling display capability be? ie a print/println capability with smooth scrolling on reaching the bottom of the display. John
• Hi John. Based on your idea Fabrice Weinberg has implemented this in the new 3.0.0 release of the library!
7. Hi. Could you post some sample code showing a scrolling using the new logBuffer? I’ve tried but all I get are characters that overwrite each other on the screen & never scroll.
Leave a Reply |
global_01_local_0_shard_00002368_processed.jsonl/46142 | SQL Server – Undocumented Stored Procedure sp_MSforeachtable
I'm not an every day SQL Server user but I use SQL Server regularly since 7.0 version until the 2005 version (not yet tried 2008 in a serious way) and from time to time I still find some nice hidden gems.
A few days ago I needed to created a cleanup script for an application and one of the tasks was to drop all tables that match a specific name pattern.
My first thought was to use a cursor to loop or a dynamic SQL statement …
… but this time I decided to google for some other approach, and I found the amazing undocumented sp_MSforeachtable stored procedure from the master database.
It does the same but it requires considerably less code and improves the script readability.
Below is the syntax for calling the sp_MSforeachtable SP: [more]
exec @RETURN_VALUE=sp_MSforeachtable @command1, @replacechar, @command2, @command3, @whereand, @precommand, @postcommand
• @RETURN_VALUE – is the return value which will be set by "sp_MSforeachtable"
• @command1 – is the first command to be executed by "sp_MSforeachtable" and is defined as a nvarchar(2000)
• @replacechar – is a character in the command string that will be replaced with the table name being processed (default replacechar is a "?")
• @command2 and @command3 are two additional commands that can be run for each table, where @command2 runs after @command1, and @command3 will be run after @command2
• @whereand – this parameter can be used to add additional constraints to help identify the rows in the sysobjects table that will be selected, this parameter is also a nvarchar(2000)
• @precommand – is a nvarchar(2000) parameter that specifies a command to be run prior to processing any table
• @postcommand – is also a nvarchar(2000) field used to identify a command to be run after all commands have been processed against all tables
As you can see, this stored procedure offer us some flexibility, but for the most common uses you will only use one or two of them.
Back to my problem, drop all tables with a specific naming pattern, I ended up using a script just like this:
declare @appName varchar(128)declare @mycommand varchar(128)declare @mywhereand varchar(128)set @appName = 'xpto'set @mycommand = 'drop table ?'set @mywhereand = 'and o.name like ''' + @appName + '__Log__%'' escape ''_''print 'Dropping all tables belonging to ' + @appName + ' application ...'exec sp_MSforeachtable @command1 = @mycommand, @whereand = @mywhereand
What I'm saying here is that the command 'drop table' should be executed for every table that match the criteria name like 'xpto_Log_%'.
As you can see its fairly simple and clean and this is just the top of the iceberg.
For more detail about sp_MSforeachtable go here and here.
2 Replies to “SQL Server – Undocumented Stored Procedure sp_MSforeachtable”
1. Regards for this valuable article. Occasionally, the very best opinions originate from the posts one would not expect. So far, I decided not to give quite much thought to commenting on web log posts and have left responses even less. Checking out your insightful report, will definately motivate me to take action on a regular basis.
Leave a Reply to 社長 日記 ブログ Cancel reply
|
global_01_local_0_shard_00002368_processed.jsonl/46145 | Tag Archives: slides
Content Guide and Workshop Slides
The link below goes to a PDF of the first iteration of the UM-Flint Web Content Guide. This version is intended to help departments “plan, structure, and maintain meaningful content.” It does not include information specific to the new Drupal content management system (CMS). This version focuses on the “what, why, and how” of defining […]
Read More |
global_01_local_0_shard_00002368_processed.jsonl/46148 | Message Font: Serif | Sans-Serif
No. of Recommendations: 0
According to the IEA, since 2006 total U.S. emissions have fallen by more than 7.7% (the largest decrease of any country or region), due partially to these factors - and real GDP is actually up a few points over that time period.
Population also increased, so emissions per capita of GDP was down more.
Print the post
What was Your Dumbest Investment?
When Life Gives You Lemons
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools? |
global_01_local_0_shard_00002368_processed.jsonl/46183 | Easy Guide on How Internet Works
Internet stands for inter-networks, or simply, a network of networks. The internet is a network of computer systems that communicate with each other across the globe. It is really vast in the structure and has a very large variety of sub-structures within itself. The networks within the internet can be:
• private (your household Wi-Fi connection),
• public (a network in a restaurant or a mall),
• academic (network in schools),
• business (available in workplaces) and
• government controlled (in metros).
The Internet is a medium through which, sharing of information and communication establishment to virtually any corner of the world is possible. This technology has enabled us to reach limits which were unimaginable before. The internet has virtually brought the entire world in our palms.
What Devices Make up The Internet?
Listing all the types of devices that make up the internet will take up the entire article itself. Therefore I shall only discuss the few articles which are essential to the Internet.
• Router: Router is like the heart of the network. It has the information about the data transmission. It has a table (Routing table) which has entries of incoming and outgoing addresses. The router’s basic job is to link the information piece from a particular incoming address to the corresponding outgoing address according to the routing table.
• Switch: A switch allows your device to connect to another device within the network. Switches manage the network ports (connections) and maintain security within the network. The main job of the switch is to maintain and secure device connectivity over the internet.
• Server: Server is actually a computer program, designed to provide some type of service to other computers. People commonly know servers as computers on which these programs install and run. Since the job is to provide a specific service, the name stands as ‘Server’ or the one who serves.’
• Communication Standards: Communication standards are basic ways in which data communication takes place. It can be wireless (Wi-Fi), Wired (Ethernet), or in most cases the combination of the two. These standards define requirement of devices, amount of speed the customer gets, the security and cost. These factors differentiate between communication standards, enabling us to make a decision.
But How Does it Work?
The primary job of the internet as a whole is to share information and communicate those pieces of information around the globe. A few set of rules emphasize on how communication will happen. We call these rules as ‘protocols.’ Systems within the internet follow these protocols and hence can understand some necessary information regarding communication like:
• Data’s source.
• Data’s destination.
• Way of sending the data.
• Size/amount of the data.
• Type of the data.
• What process does the data belong to?
• Security encryption
• Error Detection and Checking mechanism
• Data compression information
• Decision of choosing the path to the destination
And many such more information is provided by the protocols. The above list contains simple information, giving a general idea of the communication process. So, the idea is that, the entirety of information is not provided by one protocol, instead by a set of protocols. These set of protocols together, are ‘protocol suites’. The most famous and perhaps the strongest protocol suite created is the ‘TCP-IP’ protocol suite.
An Example
Leaving all these technicalities aside, let us just once see how it actually happens. Consider, you are about to see a web page. So you open your browser, you type in an area which is called as the URL bar. It is in this bar you type the web-page address. URL stands for Uniform Resource Locator, which actually locates the computer in which the web-page is stored, within the entire world, and brings it to you on your screen. Hence the name, ‘Resource Locator’.
The address in the URL bar also often has ‘https/http’ which stands for HyperText Transfer PROTOCOL (S-Secured), which is the rule being followed. Hypertext is just a text which a link to other texts is present. So, when you type ‘http’ in the URL bar, it is a request to transfer all the hypertext that is present in the address written in the URL bar. Like, if you write ‘https://buddymantra.in’ it means you are asking to transfer all the hypertext from the destination to your computer screen, which gives you access to the web-page.
What is the World Wide Web?
Looking on a larger scale, one cannot ignore ‘WWW’, when it comes to internet. As mentioned earlier, the internet is a network of computer networks and each networks have their own sub-networks (subnet). All the networks, sub-networks, super-networks (a network of some networks), are connected to all other networks. This in turn made the connection structure look like a web. A web, which is present throughout the world, as a result we have the term, World Wide Web (WWW).
This here, is the reason why we have terms like web-page (A page within the web), web-site(A collection of similar pages, forming a site). Basically WWW is the biggest internet network present over all.
However, there is a common misconception among people, that the world-wide web and the internet, both are the same things. Which isn’t true. WWW is the biggest part of the internet, but isn’t the internet in its entirety. The WWW relies on http which is explained earlier, however other services like mail, messaging, streaming are a part of the internet which can be accessed without the WWW.
Example of Internet Use without WWW
Consider, you are using your mobile phone, and using an app to send a mail to someone. You open your app, and you do not need to login (most of the time), as the mobile has you already logged in with your email account. You type in all the details like receiver’s email address(es), the subject, the body, and maybe some type of file attachment.
As you do this the protocol that runs in the background is called as SMTP (simple mail transfer protocol). The name is quite self-explanatory, it gives guidelines on how an electronic mail would be sent, moreover, if you happen to attach a file with the email, it also goes under FTP (File transfer protocol), and both SMTP and FTP work together to communicate the mail to the receiver. Mail is then sent via the internet, as you hit ‘send’. All of this achieved without accessing WWW.
How do Search Engines Work?
We all are familiar to the fact that the internet provides with a multitude of search engines, with Google standing as the biggest of them all. But how do they actually give you all the information you type instantaneously. So as you search something on any search engine, the words you type (in some cases, words you speak) are converted into ‘keywords’ and then they are transmitted to the search engine base. The base have massive amounts of server computers, all storing some kind of information of virtually all topics that are in existence.
The engine now basically focuses on the keywords you just typed and search any information relative to the keywords you gave. As a result, you get more than a single link to the your search.
How do Internet Clouds Work?
Cloud internet computing is a very new technology in the norms of the internet. Cloud does not mean a physical cloud, but it is also a service which can be public, private or hybrid. Storing and managing your personal data, over an internet server is called cloud computing. Data separation of your data and other users’ data is done via email id accounts. By doing so prevents the hassle of memory management in your personal device. The Cloud service is often used as a backup storage mechanism, where if your data is breached on your device, you can just get it back from the cloud account you have. Microsoft One Drive and Google Drive are example of cloud Services.
The basic working of an internet cloud is very simple. You store some data over the internet, within the data space you are allotted (Google Drive gives 2 GB for an account). This data is linked with your email account and is actually stored in the servers themselves. A set of protocols enables easy accessing of these data.
How Does Social Media Work?
In the internet the biggest trend by far is the invention of the social media. It has brought people as their digital incarnations over the internet, where they interact with each other in form of virtual groups of people, share media information like photos, videos, thoughts and expressions, statuses, and the list goes on endlessly.
Basically in the working, when you create a social media account, your digital version is registered within the servers of the social media service. After this registration, you can by means of various rules designed by the social media service creators, can interact, search, and basically bond with other people already present of the social network. Centralized servers of social networks link these people’s accounts to you.
0 0
Article Categories:
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/46184 | Fantabulous Science
Ever looked at the nib of your pen and thought why on Earth is it split? Ever thought after taking a long shower why the skin on your hands and feet resembles that of a wrinkly old woman? Why does a mere stone shatter the whole glass whereas a speeding bullet only makes a hole? Are these merely accidents or has everything got a reason behind it? Well, science resides in every nook and corner of our house, in every phenomenon, however tiny it is and all the seemingly weird happenings has got well-knit explanations behind them, all thanks to the wonders of science.
Courtesy: Youtube
Well, it may happen that you are an arts graduate! Or you are a law graduate! You have probably turned the pages of your elementary science book while in your secondary school. “Science is not my cup of tea” – you probably said this to yourself and attempted to close this website. But then science is as elemental as life itself and your whole existence can be woven by the knowledge and the wisdom that it contains. Now to ease the process, I have tried my best to provide precise explanations to some of the quirkiest phenomenon that happen every day everywhere in layman’s language but feel free to revert in case of doubt. Here you go! Start binging!
• Stainless steel contains iron and yet is not attracted by magnet. Why?
Courtesy: Stainless Steel Sphere
Answer: Stainless steel contains 18% Chromium, 8% Nickel, 1% Manganese, 0.08% Carbon, 0.06% Nitrogen and of course, Iron. These additional elements added to Iron render the anti-corrosive properties of stainless steel but arrange the Weber elements in an FCC (Face Centred Cubic) structure because of which stainless steel loses its magnetic properties. If the alloy is mechanically deformed, i.e. bent, at room temperature, it acquires some ferromagnetic properties and may become partly magnetic.
• When you dunk a biscuit into hot milk it crumbles. But the same does not happen with cold milk. Why?
Courtesy: Quora
Answer: That is because the intermolecular force of attraction between the molecules of a biscuit is weak. In addition to it, milk contains 85 – 87% of water. The viscosity of water reduces with increase in temperature meaning that the density of water reduces with heat as the water molecules have much higher energy to move about and seep in through the biscuit particles. On the other hand, colder water or colder milk has higher viscosity or higher density and hence the molecules take time to seep into the biscuit. That is why a biscuit easily crumbles in hot milk or hot water but not in cold milk or cold water.
• Soaps come in different colors. But soap lather is always white. Why?
Courtesy: Mama Natural
Answer: Soaps, shampoos, body-washes etc come in so many different colors and yet their foam is always white. Surprising isn’t it? Well, science has answer to almost all such mysteries. Soap when mixed with water and rubbed well creates lather which is actually a large collection of tiny soap bubbles. Again each bubble itself is actually an extremely thin film of the soap solution. This film stretches due to lower surface tension of water, causing the color of the soap to spread out well beyond the limits of recognition, making it almost impossible to detect. When light enters the soap lather, it passes through innumerable number of tiny soap bubbles which poses a surface of obstruction to the passing of light, causing it to scatter in different directions, making the foam look white.
• Why is there a split in the nib of a fountain pen?
Courtesy: TruphaeI Nc
Answer: The split is the basically the heart of a fountain pen which differentiates a classic one from an ordinary one! The split creates a channel or rather a capillary which maintains the constant flow of ink from the ink chamber inside the pen to the paper surface. As the sides of the nib spread and flex, ink moves down the open split by the action of gravity and is drawn onto the absorbent paper through the capillary formed. The greater the absorption qualities of the paper the faster or more easily the ink will move onto the paper’s surface. If you attempt to quickly scratch the nib very fast, the split overly opens and capillary action halts the flow of the ink. The ink stays in suspension, defying gravity. The smoother the inside or joining faces of the split the better will be the flow; nib quality therefore makes all the difference in the quality of a fountain pen.
• Why does our skin wrinkle when held in water for a long time?
Courtesy: Huffington Post
Answer: Because the epidermis, or the outer layer of skin on your hands and feet, contains more and more dead skin cells than any other part of your body. These cells act like an efficient sponge and soak up water, while the skin on the other parts of the body is not affected. When this dead skin absorbs water, they swell and bulge and tugs on the live skin layers beneath. The live skin layers are firmly attached to the underneath skin fibres and do not bulge out. This phenomenon of bulging out of the outer epidermis and pulling in of the inner skin layers causes the wrinkly appearance.
• Why is it not possible to donate our blood post death whereas we can donate our organs?
Courtesy: Daily Excelsior
Answer: Because a person who is dying is not probably a very healthy individual. Blood carries all the traces and all the information about the diseases that the person is suffering from. Whereas, the organs don’t! Even if the person had had a kidney infection before dying, he can still donate his eyes or other organs which are working perfectly. But his blood will still carry the information and will be infected by the infections that affected his kidney. Moreover, the blood of a sick dying individual is supposed to be loaded with lots of drugs which render it unfit for a different person with completely different sets of health issues. In addition to this, blood coagulates very fast if it is not flowing. As the heart stops, cellular damage and death sets in, including the death of the endothelium cells, which line the blood vessels, and inevitably Hypercoagulability is triggered.
• Why does a stone shatter the whole glass whereas a bullet makes a clean hole?
Courtesy: El Camino College Union
Answer: Because the “Impulse” or the “impact” of the force exerted by the bullet is much less than that exerted by a stone. Now how is that possible? Here’s how! The impulse is measures by force multiplied by time of contact. A bullet is as heavy as a stone. May be a little less; and hence both exerts almost the same momentum or similar force. But the catch is, a bullet is much faster than a stone and hence the time of contact of the bullet with the glass is very less and hence can pass through it, cleanly, without causing much damage. But a stone being slower than a bullet stays in contact with the surface of the glass for a longer period of time and hence, the impulse, Force times Time of contact is much higher for it. This impact shatters the whole glass.
• Why does milk overflow when boiled whereas water does not?
Courtesy: All India Times
Answer: Because milk is not a regular liquid like water but is a complex mixture of 85% water, 4% proteins, 5% lactose and 6% fat, among other substances. When we boil milk, fat, sugar, proteins and minerals get separated and since these components are lighter, they form a thick film, called cream or malai, on the top surface of the boiling milk, whereas, the bottom surface mainly consists of water. When milk starts boiling, this water from the bottom surface starts vaporizing and moves upwards, but does not get an outlet due to the impenetrable layer of cream formed on the top surface. The water in the milk then pushes the creamy layer out so that the vapour can escape. This then causes the milk to overflow and spill out of the vessel.
0 0
Article Categories:
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/46186 | Opened 9 years ago
Last modified 8 years ago
#5409 new defect
WOODRUFF: Annoying scrolling behaviour in windowed mode
Reported by: SF/alguno Owned by: DrMcCoy
Priority: normal Component: Engine: Gob
Keywords: Cc:
Game: Woodruff
While testing woodruff against svn 53090 I stumbled across an annoying behavior. When you're in a scene where you can scroll to the left/right or top/bottom (like the wino's alley) and you want to scroll to the left/right you have to move your mouse to the edge of the window. When in full-screen mode this works okay, but when you're running scummvm in windowed mode you have to position your mouse pointer exactly at the edge of the window. If you're one pixel off nothing happens. Could this behavior be improved so that the hot-spot area for triggering the scroll is more than one pixel large and that when you hold the mouse on that position the scene automatically keeps scrolling until the edge is reached?
Thanks in advance and keep up the great work!
Ticket imported from: #3084414. Ticket imported from: bugs/5409.
Change History (6)
comment:1 by SF/kuroshiro, 9 years ago
This isn't really a bug. The solution is a bit buried in the readme though.
Hit Ctrl+M to toggle mouse capture in windowed mode in ScummVM.
comment:2 by DrMcCoy, 9 years ago
Well, the thing is, that gob3 behaved like that. And for the scrolling in Woodruff, I didn't change anything (although the original there works like what you'd want). I should probably change that, maybe for Gob3 too (hoping that this won't introduce some other glitches, like not being able to reach hotspots).
comment:3 by sev-, 9 years ago
Owner: set to DrMcCoy
Priority: normalhigh
comment:4 by sev-, 9 years ago
comment:5 by sev-, 8 years ago
Priority: highnormal
comment:6 by sev-, 8 years ago
Lowering priority.
Note: See TracTickets for help on using tickets. |
global_01_local_0_shard_00002368_processed.jsonl/46244 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://cdu-allensbach.de/100%Daily2019-10-29 21:38
https://cdu-allensbach.de/sitemap.html50%Monthly2019-10-29 21:38 |
global_01_local_0_shard_00002368_processed.jsonl/46266 | Stage Designs
Good Tri
Angie Theresia from Domus Cordis Community (part of Indonesian Catholic Church) in Jakarta, Indonesia brings us this awesome conference look.
The stage itself was inspired by triangle wall by Chris Monson, Faith Chapel.
The construction was from multiplex and white Coroplast. The triangles were made from 6mm multiplex, spray painted white matte. They also used a wire mesh to make the word “revealed” with each letter containing 22 layers of 2×2 cm wire mesh, also painted white to reflect the lighting.
At the edge of the triangle wall, they also added a WS 8201 LED strip light constructed in a chevron made from multiplex.
They also used a lot of volunteers, which made the process more enjoyable and less expensive.
Overall the budget for all the stage, lighting, and projector cost them around $5200 USD.
stage-XN-2 stage-XN-cetar working-process XN-gif000 XN-gif055 XN-gif073 XN-gif132
Chiseled Mountains Strips Falling
2 responses to “Good Tri”
1. Chris Nicholson says:
When it says they used “Multiplex” that means plywood right?
Leave a Reply
Solve : *
24 + 18 =
|
global_01_local_0_shard_00002368_processed.jsonl/46268 | Tag Archives: Planktonic
The Invertebrate: Sea Hare
The sea hare is one of the most amazing invertebrates you can see in the waters surrounding Catalina Island and here at CIMI. You can find two different species in our coves and our aquariums – the California sea hare and the black sea hare. Sea hares belong to the phylum mollusca, making them relatives of other gastropods like slugs and snails, as well as squids, octopuses, and clams. These marvelous molluscs were named sea hares (Latin: lepus marinus) by the ancient Romans because of their rhinophores, two appendages on the top of the animal’s head that look a lot like rabbit ears. Sea hares also display large wing-like flaps on their backs known as parapoidea, which can sometimes be used for swimming. The California sea hare can grow to be as large as sixteen inches long and five pounds, while the black sea hare is the largest gastropod, sometimes reaching over two feet long and more than thirty pounds!
Sea Hare 1The sea hare begins its life as one of as many as eighty million eggs, all laid in a large mass that looks a little bit like a bunch of spaghetti. Only twelve days after being laid, the sea hare larvae are ready to hatch. For the first thirty days of its life, a larval sea hare is planktonic. This means that the animal is largely unable to control its movements and floats about on ocean waves and currents. After about thirty days, the sea hare has grown large enough to no longer be planktonic. Over the next three months, the sea hare will double its body weight every ten days! Scientists who study sea hares have found that small juvenile individuals seem to prefer deeper water (up to 60 feet), while adults seem to prefer shallower water. But no matter how deep they live, sea hares will always prefer rocky areas with lots of algae for them to munch on. They especially love red algae, which gives them their dark red to brown (and black) coloring. In the California sea hare, the red algae also make the animals’ ink a purpleish-red color. The California sea hare uses this irritating ink as a defense mechanism against predators. Around Catalina, you can find sea hares enjoying a red algae snack of plocamium or pterocladia.
Sea Hare 3
A California sea hare’s bright red ink – thanks to algae!
After about four months, sea hares reach maturity and are capable of laying eggs of their own. All species are hermaphroditic. This means that each individual is capable of acting as both a male and a female during reproduction. As many as twenty individuals can gather at the same time in order to reproduce in what scientists call mating chains.
The typical lifespan for a sea hare is only about one year, however, cooler water like that surrounding Catalina Island helps to extend the lifespan by delaying the spawning (mating) process.
|
global_01_local_0_shard_00002368_processed.jsonl/46282 | Britain's best cycling classifieds
Shift your bikes and gear fast in Bikemart, the classified section of Cycling Weekly magazine.
Place your ad here and it'll appear at and in the Bikemart pages of the magazine. Adverts cost £25 for bikes over £1000, and £20 for everything else. Please note that only the first 75 words of your advertisement will appear in Cycling Weekly magazine, so please keep your advert brief.
Whether you're selling a bike or accessories, or placing a 'wanted' advertisement, you're in the right place. |
global_01_local_0_shard_00002368_processed.jsonl/46299 | Should I Cash Out My 401k Early to Pay Off Debt?
The short answer to this question is no. The longer answer is still no as a general rule, but it may be a consideration in some very limited circumstances.
Here’s the rationale behind not cashing out the 401k. Sure, it may be tempting to take that big chunk of that savings and throw all at the debts, but the downsides of that choice usually will outweigh the benefits.
When you cash out a retirement account early, the IRS levies a 10% penalty against you, and the non-Roth dollars are taxed at your highest federal marginal rate for that year. If you take out $25,000 from your 401k, the penalty automatically takes $2,500 from that withdrawal before your tax rate is even applied.
For traditional dollars, if you are in the 22% tax bracket, that also takes away 22% of your withdrawal. But wait! That withdrawal is counted as gross income for the year, so it could even bump you up to a higher tax bracket, further increasing your tax liability for the year.
You may also owe state income taxes on that withdrawal. In Virginia, the top marginal rate is 5.75%, which is not terribly high. However, other states have top marginal rates of 9%, 10%, or even all the way up to 13.3% in California!
Think of how all of those taxes chip away at your life savings as soon as you make the withdrawal. Is it worth losing up to half of that money up front, as well as the tax-sheltered growth in the account? In almost all cases, the answer is no.
As a coach, I have found that there are two exceptions to this otherwise rigid rule: avoiding a bankruptcy or a foreclosure.
Both a bankruptcy and a foreclosure are extremely heavy burdens to bear. A Chapter 7 bankruptcy will clear one’s debts, but secured assets in the bankruptcy are repossessed. One may reaffirm the debts, but the debtor still owes the creditors for those debts not liquidated in the Chapter 7.
A Chapter 13 is a three-to-five year payment plan whereby the debtor gives a large portion of financial control to the Chapter 13 trustee for their region. It is difficult to do anything during this time, even a debt snowball, so I strongly recommend avoiding a bankruptcy in nearly all circumstances.
A foreclosure is also a devastating experience. Imagine losing the home you’ve lived in for years, made renovations on, worked so hard for that down-payment, and in which you dreamed about raising your family. The foreclosure sweeps that away, wrecks your credit, and uproots emotional stability in your family’s life.
Normally, I do not suggest cashing out a 401k to pay off debts. However, if your current track is either a bankruptcy, or a foreclosure, or even both, then it may be something to seriously consider only to avoid either of those things from happening. The cost of the early cash-out is high, but not as high as a bankruptcy or foreclosure.
These are largely the only two circumstances under which I will even entertain the option, especially a Chapter 13 bankruptcy. I’ve had multiple people come to me looking for help, but were unable to work with me at that time because the trustee would not allow them to work my fee into their plan.
These folks had to largely continue on their own or through Financial Peace University (if even that was allowed), though they would have worked out of the bankruptcy much more quickly with my guidance.
That’s a fate I don’t want for anyone. If it requires you to take some from retirement, that’s something we can discuss to see if it really is the better of two bad options.
If you need help in making this decision, reach out to me so we can talk about the best path moving forward. In our conversation, I will handle your concerns with the utmost care and sensitivity to what you’re dealing with.
Get in touch with me today to see how there is a better way moving forward. I’ll show you how you can get through this!
Get the Latest Updates and Offers!
Success! You're on the list.
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/46302 | Namecoin is one of the first alternate cryptocurrencies based on bitcoin (sha-256) which offers additional features.
Namecoin = bitcoin + domain name services. Namecoin uses .bit domain name pool.
Windows QT wallet download
Official website
Always use the latest Namecoin client version from the official website to avoid issues.
Namecoin most important features
• Securely register and transfer arbitrary names (keys), no possible censorship!
• Attach values (data) to the names (currently up to 520 bytes, will be extended)
• Trade and transact namecoins, the digital currency NMC
• Name/value pairs are stored in the blockchain attached to coins
• Names are acquired through new transaction types – new, first-update and update
• Names expire after 12000 blocks unless renewed with an update
• No two unexpired names can be identical
Sample usages of Namecoin
• DNS: domain_name => domain_zone_configuration (also for i2p, Tor)
• TLS: https like encryption and secure identification by Namecoin domain/ID/name
• Alias/Identity: user_name => user_public_identity (email, name, gpg key, BTC-adress, etc)
• Timestamping: document_hash => document_infos (name, hash, owner, etc)
• Broadcasting / Messaging
• Web of trust
• Bonds, shares
• Voting
• Torrent tracker
Total coins: 21 million Namecoins (the same as bitcoin). Each Namecoin is divisible down to 8 decimal places.
Namecoin currently uses the .bit domain. As of January 2014, 123616 .bit domains have been registered.
Remember to use the lastest client version! Download it from below.
Official Namecoin Site |
global_01_local_0_shard_00002368_processed.jsonl/46311 | Skip navigation
Jive Release Blog
1 Post authored by: John Lascurettes
Clearing or containing elements with class="clearfix"
I've had more than one engineer ask, "what is the CSS class 'clearfix'?"
Short answer:
It's an easy way to make sure floated content is contained by its container (when you want it to). It's cross-browser friendly and it prevents the need to start floating everything and their parents which can lead to other issues. See the attached file for a live example.
You don't need to go crazy and start adding class="clearfix" to everything. Just add it only to parent elements that need to contain floats where content coming after but sibling to that parent needs to clear the floats.
Long answer:
Floats are meant to break out of their parent container and ancestors on purpose, allowing for text or other sibling or descendent content to wrap something like an image. But as is often the case, UI designers want subsequent content to clear that float for the purpose of controlled layout and predictability. There are many ways to achieve this:
• Adding extraneous elements like <div style="clear:both"> </div> or an HR or BR with styles applied. Drawbacks: code bloat; non-semantic markup; easy to disassociate with the floated element in the markup.
• Add clear:left; to the next element (sibling to the float or sibling to the float's parent). Drawbacks: that will make that element clear all floats (including ones you don't want it to); can easily be disassociated with the original float context in the markup.
• Start floating everything. Drawbacks: This creates more layer-caked problems; it's compounded by IE on Windows (up until, but not including IE8) with its hasLayout rendering property (see technical answer).
• Rely on a class name with browser targeted properties in CSS fix. This is our rock star …
Technical answer (see attachment):
Floats, as mentioned, are meant to break out of their parent containers. When we want a subsequent item to clear that float, what we really want is the float or floats to be contained by its parent element and not break out. With one class="clearfix" on a parent element (the CSS definitions for which have been added to jive-global.css as of 2.0) we can achieve that.
For compliant browsers (any modern browser that is not IE, and IE8), we do that with generated content, this is future proof as it's also standards compliant. For IE on Windows (below IE8) we do that with targeted CSS hacks that are ignored by modern browsers, giving it the mysterious, completely non-compliant property of hasLayout. The mumbo jumbo black magic of hasLayout is just nasty nasty and nasty. It's responsible for or related to all kinds of bugs in IE Windows. For the best explanation in existence on hasLayout, see We can even target the other dead IE, IE mac, and give it its own CSS fix; but it's not really needed for CS support.
Here's the CSS definitions:
* for compliant browsers */
.clearfix:after {
clear: both;
display: block;
height: 0;
visibility: hidden
/* affects only IE7 */
.clearfix {
min-width: 0;
/* targets only IE5-6 and hidden from lowly IEmac \*/
* html .clearfix { height: 1%; }
/* end hide IEmac */
/* What? You want to get crazy and do IEmac too? Okay. \*//*/
.clearfix { display: inline-table; }
/* end IEmac only */
EDIT: I realized I never attached the example HTML file.
Filter Blog
By date: By tag: |
global_01_local_0_shard_00002368_processed.jsonl/46312 | Journyx's hosted environment has the ability to send out emails through our mail server, This also has the ability to 'spoof' any email address as the From address. Spammers can use the same technique to send you emails that appear to come from ebay, but didn't actually originate there. Email spoofing is a big problem that email servers don't really have a way to prevent. A properly configured email client, or a program, can send mail as any address.
Identifying the issue
Go under Configuration -> System Settings -> Server and Email. Below is an example screenshot of that page. Notice the highlighted information. SMTP (outgoing) email server is our mail server, 'From' address for email sent by the system is This means it's spoofing the from address. If SMTP (outgoing) email server was a mail server at, that would not be spoofing.
What can I do?
Both of these options will likely require your IT team in some capacity. Journyx Support cannot make these changes for you, nor will they know what the correct values are or how to change them on your domain.
Option 1: Configure Journyx to send through your email server
The most sure-fire way to make sure your mail gets to the recipient is to configure Journyx to send using your own mail server. This is similar to configuring Outlook or another mail client and can be done using the fields on the Server and Email page. Some IT teams will not allow this to happen, but it's worth it to ask as other options could still fail depending on the configuration of the email server that is receiving the mail.
Option 2: Set Journyx to be able to send mail as your domain
In the past years there have been a couple standards that have arisen that try to combat this problem. The most common is Sender Policy Framework, or SPF. This defines a way for the owner of a domain name ( ) to say which mail servers should be authorized to send mail 'from' that domain. Below is an example of an SPF record. This does not allow to send mail as this domain.
In order to authorize Journyx's mail server you just need to add the following to your SPF record:
This says "Find the records for and say they're OK." This method does not have a 100% success rate, but it will help significantly.
Q: Can I just whitelist your IP address?
A: Since May 2017 Journyx cloud is now hosted on Amazon Web Services. Our mail server is as well. This means our mail server could be assigned any IP address assigned to AWS which is a huge amount. Whitelisting all of these IP addresses is possible, but opens you up to any spammer that uses AWS to send spam since they will be using the same addresses. |
global_01_local_0_shard_00002368_processed.jsonl/46336 | Exotic Rage
Evil Incarnate
It’s us or them.
8 responses to “Exotic Rage
1. Look. It’s one thing to believe that other species also have a right to inhabit the planet and not be eradicated so we can build golf courses or attract tourists (or simply stuff our gullets). It’s another thing to despise a non-native, intrusive species with no natural predators around to keep the numbers in balance. You written before about humans and our propensity to turn animals into pets, either individually or, in this case, collectively. Don’t all animals (including insects) have species whose proximity they tolerate and those they don’t? As far as dealing with your problem, I commend you to the “Predator” section of this article: http://animals.mom.me/indian-peacocks-predators-8029.html
Liked by 1 person
2. Nora Lee
Well, since you have courageously admitted to your peafowl abhorrence, I feel I can raise my hand and second your motion. I actually like most birds and when I first moved to the area, I was dazzled by the peacocks. Then I became a regular stop on their foraging expeditions. Seems they really like red flowers. I know because they ate all of mine one summer. And one morning I came out to find six of them sitting on top of our Prius. It looked like they were trying to hatch it! Those feet come with real dinosaur claws, you know. Now, I have Peanut the wonder dog. All 10 pounds of her gets extreme pleasure out of making those monsters fly!!! Go Peanut!
Liked by 2 people
This is so spot on! I confess I might have sort of let Scout out that day on purpose. Effect, huh? I continue to be in awe of your wonderful gift of putting words together on the page. And of course, that is a totally unbiased opinion of your parent.
Liked by 1 person
4. Ha! I have friends who have peacocks in their neighborhood. I didn’t realize they were such a nuisance…
Liked by 1 person
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/46338 | source: soft/build_system/build_system/repsys/tags/V1_6_11/ @ 1
Last change on this file since 1 was 1, checked in by fasma, 13 years ago
Initial Import from Mandriva's soft revision 224062 and package revision 45733
File size: 69 bytes
1recursive-include RepSys *.py
2include repsys repsys.conf
Note: See TracBrowser for help on using the repository browser. |
global_01_local_0_shard_00002368_processed.jsonl/46342 | The Pacific Islands Forum (PIF)
Established in 1971, the Pacific Islands Forum (PIF) is the biggest regional political organization, it initially included 16 states and territories, with various institutional statuses.
Initially admitted to observer status following the Noumea Accord in 1999, New Caledonia became an associate member of the Forum in 2006. In September 2016, New Caledonia and French Polynesia were finally admitted as full members at the 47th Pacific Islands Forum in Pohnpei, Micronesia.
The PIF now has 18 members, including Australia, Cook Islands, Fiji, Kiribati, Marshall Islands, Micronesia, Nauru, Niue, New Zealand, Palau, Papua New Guinea, Solomon Islands, Samoa, Tonga, Tuvalu, Vanuatu, French Polynesia and New Caledonia.
The Forum also includes nine observers: American Samoa, East Timor, Wallis and Futuna, the ACP Pacific Group, the World Bank, the Asian Development Bank, the Commonwealth Secretariat, the United Nations and Western and Central Pacific Fisheries Commission.
The Forum Secretariat is headquartered in Suva. Fiji and headed by Dame Meg Taylor of Papua New Guinea, who was appointed in 2014 for a three-year term. The presidency of the organization is ensured, in turn, by Heads of State and Government from member countries according to a "gentlemen agreement".
The Forum, which is the first international political organization in the Pacific region, meets at its leaders' summit each year to set the broad guidelines for regional policy and define the roadmap for all the technical agencies of the Council of Regional Organizations of the Pacific (CROP), including The SPC and SPREP.
Key issues
Key issues addressed by the Forum include:
• The Framework for Pacific Regionalism (FPR),
• The Pacific Resilient Development Framework (PRDF),
• The Regional Security Framework (RSF) ;
And the regional priority issues, namely:
• The economic benefits of fishing,,
• Climate change,
• Information and communication technologies,
• West Papua,
• Disability,
• and the mobilization and regional harmonization of trade practices
Liens utiles |
global_01_local_0_shard_00002368_processed.jsonl/46347 | Instructor: Dr. Ganesh Bagler
Topics covered in the course:
1. Introduction to Biological Complex Systems:
• Definition and notion of system and complexity
• Natural selection and evolution of biological systems
• Adaptability; Differences in engineered vs. evolved systems
2. Biological Sequences and Alignment:
• Biological sequences: DNA, RNA, Protein
• Sequence Alignment; phylogeny
• Basics of Dynamic programming
• Needleman and Wunsch Algorithm
• Applications of alignment algorithms
3. Biological Macromolecules: Proteins:
• Introduction to proteins
• Basic ingredients, Ramachandran Plot
• Protein structure, function and folding
• Protein structure organization
• Protein folding models
• First principle and Knowledge-based models
4. Homology Modeling and Clustering Methods:
• Basics of protein structure modeling
• Homology modeling
• Basics of clustering
• K-means clustering
5. Microarray- Data and Analysis:
• Basics of microarray technique
• Applications of microarrays
• Data compilation and analysis
• Construction of network models from microarray data
6. Introduction to Graph Theory and Systems Biology:
• Introduction to graph theory
• Graph theoretical metrics
• Application of graph theoretical analysis for biological systems modeling
7. Systems Biology- Applications:
• Gene regulatory networks
• Protein-protein interactomes
• Anatomical networks
Reference book:
1. Carl Branden and John Tooze, "Introduction to protein structure", Garland Science (2nd Ed), 1999
2. Yaneer Bar-Yam, "Dynamics of Complex Systems", Addison-Wesley, Reading (MA), USA, 1997 |
global_01_local_0_shard_00002368_processed.jsonl/46358 | CrySP Speaker Series on Privacy
View the list of past and upcoming speakers
Constraining Pseudorandom Functions Privately
David Wu, Stanford University
[Download (MP4)] [View on Youtube]
May 10, 2016 2:00pm, in DC 2585
In a constrained pseudorandom function (PRF), the holder of the master secret key is able to derive constrained keys with respect to a boolean circuit C. The constrained key can be used to evaluate the PRF on all inputs x for which C(x) = 1. In almost all existing constructions of constrained PRFs, the constrained key itself reveals its underlying constraints. We introduce the concept of private constrained PRFs, which are constrained PRFs with the additional property that the constrained keys do not reveal their constraints. Our main notion of privacy captures the intuition that an adversary, given a constrained key for one of two circuits, is unable to tell which circuit is associated with its key. As a primitive, private constrained PRFs have many natural applications in searchable symmetric encryption, deniable encryption, and more. In this talk, I will introduce our notion of privacy for private constrained PRFs, and describe some of their applications. Finally, I will show how we can construct private constrained PRFs for different classes of constraints using indistinguishability obfuscation or concrete assumptions on multilinear maps.
Joint work with Dan Boneh and Kevin Lewi
|
global_01_local_0_shard_00002368_processed.jsonl/46359 |
This user has no recent positive reputation changes
Stack Overflow 10,687 rep 8 gold badges60 silver badges98 bronze badges
Science Fiction & Fantasy 3,153 rep 3 gold badges19 silver badges36 bronze badges
Beer, Wine & Spirits 1,360 rep 1 gold badge8 silver badges23 bronze badges
Academia 835 rep 1 gold badge7 silver badges16 bronze badges
Software Engineering 595 rep 5 silver badges13 bronze badges
Votes cast (2)
all time by type
2 up 0 question
0 down 2 answer |
global_01_local_0_shard_00002368_processed.jsonl/46360 | CSHC Sermons
“The Resurrection” - Bro. Leon Stewart - Jemison Easter Meeting 1979
April 18, 2019
In 1979, on Easter Sunday morning in Jemison, Bro. Leon Stewart preached “The Resurrection”. Bro. Leon explains how a person experiences the resurrection and how it relates to Pentecost and the last days. Enjoy listening to Bro. Leon as he uses multiple scriptures, including passages from John 11 and Acts 2, to bring clarity to this subject, which appears to be misunderstood by the majority of the world.
Bro. Chris Collier |
global_01_local_0_shard_00002368_processed.jsonl/46401 | Skip to content
Trump Aiming For Madison’s Willy Street Vote?
August 17, 2019
Smart politicos know everything they do should always be about addition. Growing your level of support is the key. That has hardly been a factor, however, in the Donald Trump White House where hugging the white male base and stroking it continuously, to the exclusion of all else, has been the only consideration.
But might that be changing? Given recent polling, along with economic woes on the horizon, might Trump’s team now see a need to reach out to voters? Even ones who live in the very progressive zip codes in Madison?
I had to smirk when it was reported the Trump administration is coming to the defense of Led Zeppelin. It all comes down to a copyright dispute over the opening passage from one of rock’s best-known anthems, “Stairway to Heaven”. It is perhaps the best known notes of any song for the past couple generations of Americans.
So now the Justice Department has filed a friend of court brief supporting Led Zeppelin against a claim that it stole the musical passage from an earlier recording, “Taurus” by Spirit. The lawsuits have been under way for years between the bands, and more legal wrangling is in the works for the courts in September. Who knows how it all will end?
But Trump is surely hoping to look hip and ‘with it’ when supporting one of the rock worlds best-known songs and bands. It might even work. After all, Trump already has the colored hair and skin. Might he show up one night at a rally with a guitar and mock sing? It would surely be more entertaining than listening to his ‘old hits’ about crowd size and emails.
And so it goes.
Comments are closed.
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/46405 | Human Beings as Cosmic Co-Creators
By Dennis Klocek / November 30, 2012 /
The focus of this article is to explore the changing relationships between human beings and the natural world. …transcendent beinghood was relegated to religion and knowledge of physical forces became the domain of science, opening a void in the soul between mysticism and empiricism. In earlier times human beings experienced the forces of nature as…
Read More |
global_01_local_0_shard_00002368_processed.jsonl/46411 | Key Features
• Various SEC filing data available including balance sheets, cash flows and more
• Central Index Key (CIK) and ticker conversions for looking up companies
• Obtain spreadsheets of a company's entire annual or quarterly statement
• Featuring popular web formats including JSON and XML
• Automatically generated API Documentation that describes how to use our APIs
• Code samples in multiple languages including Java, Python and cURL commands
• A web console right here to call our API with your own parameter values
Why SEC Filing Data?
A large number of investors fail to do even the basics of researching their investments, like reviewing publicly available financial statements. These filings contain a wealth of information that can be used to assess the financial health of a company. Part of the problem is that some investors aren't even aware that this information exists. Another part of the problem is that getting this information is too difficult. The SEC does not have a modern API so get their data from our API and give your investors direction on their investments.
Real-Time Delivery
Contact us with your webhook instead of calling our API and Last10K will deliver SEC Filing data to your application immediately. |
global_01_local_0_shard_00002368_processed.jsonl/46412 | MiSeCo #5: Castle.DynamicProxy ForTheWin!
In the last post, I described how I’ve tried to implement a dynamic proxy functionality in MiSeCo and failed. The process of manual injection of another method into the newly created type was way too complicated to understand in the short time I could dedicate to it. I needed to proceed with other tasks in the project. Fortunately, I have received a few valuable comments on reddit.com, which suggested to use the Castle.DynamicProxy library, which does the same thing I was trying to accomplish.
DynamicProxy is being used in many other popular frameworks, like NHibernate (for lazy loading) or Moq and Rhino Mocks (for… mocking). They also provide a very cool explanation of what a proxy is, which I would like to quote here:
One way of thinking about proxies, is by the analogy to The Matrix. I assume there’s no one on the planet who hasn’t seen the movie and can be spoiled here, by the details of the plot. Anyway, people in the matrix aren’t the actual people (‘The spoon does not exist’, remember?) They’re proxies to the actual people that can be… wherever. They look like ones, they behave like ones, but at the same time, they are not them actually. Another implication is the fact that different rules apply to proxies. Proxies can be what the proxied objects are, but they can be more (flying, running away from bullets, that kind of stuff). Hopefully you get the point, before I take that analogy too far. One more important thing, is that proxies ultimately delegate the behavior to the actual objects behind them (kind of like - ‘if you’re killed in the matrix, you die in the real life as well’). https://github.com/castleproject/Core/blob/master/docs/dynamicproxy-introduction.md
With this library you are able to create a few kinds of proxy objects. For example, you can have a class which intercepts the call, does something with it (i.e. logs information about a call) and invokes the original implementation. There is also another type of proxy - the one without a real implementation behind it. In such cases you have an interface you want to implement and the proxy does all you need. The latter one is what I need in MiSeCo. I want to get information about the call to my interface.
If you read the last post, you probably remember the loooong code listing working on IL and setting up a newly created method. As I said it was too much for me at the moment and I gave up on it. Now, I would like to show you the code, which does the same thing using the Castle.DynamicProxy.
This class will intercept the calls to a service interface.
internal class MethodInterceptor : IInterceptor
public void Intercept(IInvocation invocation)
Console.WriteLine($"New call: {invocation.Method.Name}");
Type returnType = invocation.Method.ReturnType;
invocation.ReturnValue = returnType.IsValueType
? Activator.CreateInstance(returnType)
: null;
For now it is only writing the invoked method name to the console and returning a default value based on the return type of the invoked method. Later it will contain code sending an http request to the service and getting results.
Next, we will create an object with our MethodInterceptor handling all the calls.
public T CreateServiceObject<T>() where T:IContractInterface
var generator = new ProxyGenerator();
var proxy = generator.CreateInterfaceProxyWithoutTarget(typeof(T), new MethodInterceptor());
return (T)proxy;
As you can see it’s really simple. One call to ProxyGenerator and our object is created.
Testing time!
Now it’s time to test it! I have created a simple interface containing two methods - one returning an int (value type) and the other a string. The interceptor should return 0 and null.
public interface IFirstDynamicInterface
int Add(int a, int b);
string GetString();
And a console application is running everything.
public static void Main(string[] args)
var miseco = new MiSeCo();
var service1 = miseco.CreateServiceObject<IFirstDynamicInterface>();
int c = service1.Add(2, 2);
string s = service1.GetString();
Console.WriteLine($"s is null: {s == null}");
It creates a service object based on my test interface, invokes both methods and prints out the results:
New call: Add
New call: GetString
s is null: True
It works! :) As you can see it was really easy. From one side it’s a shame I didn’t implement it myself, but from the other, it was far more complicated than I initially anticipated and it would probably take a really long time to do it properly. Here I have a working solution, which took something like a dozen lines of code and I am pretty sure it has less bugs than anything I would be able to come up with. It just shows you, sometimes it’s better to take a step back and try something different before you spend days on something which can take away your whole motivation.
Now, when I know how to do proxy classes, I will have to think how to design an API for services so that I can invoke a service classes remotely.
Michał Dymel's Picture
About Michał Dymel
Szczecin, Poland https://devblog.dymel.pl
Web Analytics |
global_01_local_0_shard_00002368_processed.jsonl/46414 | Entry into the Bitcoin marketplace is often very intimidating for casual consumers. Giving users a dead simple and hands-free way to put small amounts of money into Bitcoin does great things for the ecosystem and opens the door for "self-taxing" into all kinds of personal investments.
It's easy to put a few cents into a long-term investment, but at the end of the day, those cents turn into a welcomed return.
Built With
Share this project: |
global_01_local_0_shard_00002368_processed.jsonl/46435 | numoverduetasksforprocessmodel() Function
Returns the number of tasks in both active and completed process instances of the specified process model, which are currently overdue (if the task is still active) or were completed past their deadline.
numoverduetasksforprocessmodel( processModelId, [includeSubProcessData] )
processModelId: (Integer) The Id number of the process model.
Deleted and archived process instances are not counted.
numoverduetasksforprocessmodel(processModelId) returns 10 |
global_01_local_0_shard_00002368_processed.jsonl/46436 | The Flowgraph is the implementation of visual scripting, so allowing non-programmers to interact with different parts of CRYENGINE.
For more information about the Flowgraph in the Sandbox Manual see: Flow Graph Editor.
Adding the FlowEvents Table
The FlowEvents table is needed to define the custom inputs and outputs supported by the Script Entity.
NewEntity.FlowEvents =
Inputs =
PowerOn = { NewEntity.Event_PowerOn, "bool" },
PowerOff = { NewEntity.Event_PowerOff, "bool" },
Position = { NewEntity.Event_Position, "Vec3" },
Outputs =
PowerOn = "bool",
PowerOff = "bool",
Value types supported for inputs and outputs:
Adding a Flow Node Input
The following line, taken from the Inputs table contained inside the FlowEvents, outlines the addition of a flow node input.
PowerOn = { NewEntity.Event_PowerOn, "bool" },
Each input element is defined by its name and a table which contains two elements:
1. A reference to the script function to call when the input is activated
2. The value type accepted by the input.
The following code snippet represents a skeleton of the implementation of a function that would receive the flow input.
function NewEntity:Event_Position(sender, position)
-- read the position value and set it somewhere
The following code snippet represents the implementation of a function that would read the input value.
function NewEntity:Event_PowerOn(sender)
-- code to implement a reaction to the flow node input
Adding a Flow Node Output
A new element needs to be added to the Outputs table with a name and the value type of the output. Example:
PowerOn = "bool",
An output is activated by calling the function BroadcastEvent with a string representing the name of the output to be activated.
BroadcastEvent(self, "PowerOn");
If output value matters, use function ActivateOutput:
self:ActivateOutput("ActiveCount", self.nActiveCount); |
global_01_local_0_shard_00002368_processed.jsonl/46439 | _Type.IsArray Property
Provides COM objects with version-independent access to the IsArray property.
property bool IsArray { bool get(); };
public bool IsArray { get; }
member this.IsArray : bool
Public ReadOnly Property IsArray As Boolean
Property Value
true if the Type is an array; otherwise, false.
This property is for access to managed classes from unmanaged code, and should not be called from managed code.
The Type.IsArray property gets a value indicating whether the Type is an array.
Applies to |
global_01_local_0_shard_00002368_processed.jsonl/46440 | Create and customize recovery plans
This article describes how to create and customize a recovery plan in Azure Site Recovery. Before you start, learn more about recovery plans.
Create a recovery plan
1. In the Recovery Services vault, select Recovery Plans (Site Recovery) > +Recovery Plan.
2. In Create recovery plan, specify a name for the plan.
3. Choose a source and target based on the machines in the plan, and select Resource Manager for the deployment model. The source location must have machines that are enabled for failover and recovery.
Failover Source Target
Azure to Azure Azure region Azure region
VMware to Azure Configuration server Azure
Physical machines to Azure Configuration server Azure
Hyper-V managed by VMM to Azure VMM display name Azure
Hyper-V without VMM to Azure Hyper-V site name Azure
VMM to VMM VMM friendly name VMM display name
A recovery plan can contain machines with the same source and target. VMware and Hyper-V VMs managed by VMM can't be in the same plan. VMware VMs and physical servers can be in the same plan, where the source is a configuration server.
4. In Select items virtual machines, select the machines (or replication group) that you want to add to the plan. Then click OK.
• Machines are added default group (Group 1) in the plan. After failover, all machines in this group start at the same time.
• You can only select machines are in the source and target locations that you specified.
5. Click OK to create the plan.
Add a group to a plan
You create additional groups, and add machines to different groups so that you can specify different behavior on a group-by-group basis. For example, you can specify when machines in a group should start after failover, or specify customized actions per group.
1. In Recovery Plans, right-click the plan > Customize. By default, after creating a plan all the machines you added to it are located in default Group 1.
2. Click +Group. By default a new group is numbered in the order in which it's added. You can have up to seven groups.
3. Select the machine you want to move to the new group, click Change group, and then select the new group. Alternatively, right-click the group name > Protected item, and add machines to the group. A machine or replication group can only belong to one group in a recovery plan.
Add a script or manual action
You can customize a recovery plan by adding a script or manual action. Note that:
• If you're replicating to Azure you can integrate Azure automation runbooks into your recovery plan. Learn more.
• If you're replicating Hyper-V VMs managed by System Center VMM, you can create a script on the on-premises VMM server, and include it in the recovery plan.
• When you add a script, it adds a new set of actions for the group. For example, a set of pre-steps for Group 1 is created with the name Group 1: pre-steps. All pre-steps are listed inside this set. You can add a script on the primary site only if you have a VMM server deployed.
• If you add an manual action, when the recovery plan runs, it stops at the point at which you inserted the manual action. A dialog box prompts you to specify that the manual action was completed.
• To create a script on the VMM server, follow the instructions in this article.
• Scripts can be applied during failover to the secondary site, and during failback from the secondary site to the primary. Support depends on your replication scenario:
Scenario Failover Failback
Azure to Azure Runbook Runbook
VMware to Azure Runbook NA
Hyper-V with VMM to Azure Runbook Script
Hyper-V site to Azure Runbook NA
VMM to secondary VMM Script Script
1. In the recovery plan, click the step to which the action should be added, and specify when the action should occur:
1. If you want the action to occur before the machines in the group are started after failover, select Add pre-action.
2. If you want the action to occur after the machines in the group start after failover, select Add post action. To move the position of the action, select the Move Up or Move Down buttons.
2. In Insert action, select Script or Manual action.
3. If you want to add a manual action, do the following:
1. Type in a name for the action, and type in action instructions. The person running the failover will see these instructions.
2. Specify whether you want to add the manual action for all types of failover (Test, Failover, Planned failover (if relevant)). Then click OK.
4. If you want to add a script, do the following:
1. If you're adding a VMM script, select Failover to VMM script, and in Script Path type the relative path to the share. For example, if the share is located at \<VMMServerName>\MSSCVMMLibrary\RPScripts, specify the path: \RPScripts\RPScript.PS1.
2. If you're adding an Azure automation run book, specify the Azure Automation Account in which the runbook is located, and select the appropriate Azure Runbook Script.
5. Run a test failover of the recovery plan to ensure that the script works as expected.
Watch a video
Watch a video that demonstrates how to build a recovery plan.
Next steps
Learn more about running failovers. |
global_01_local_0_shard_00002368_processed.jsonl/46441 | Page tree
Skip to end of metadata
Go to start of metadata
If required, you can instruct OnApp to make sure a VS is never booted on the same compute resource as another specific VS. This may be important if, for example, you have two name servers or a load balanced web server, and you need to keep VSs on separate physical servers.
To isolate one VS from another:
1. Go to your Control Panel's Virtual Servers menu.
2. Click the label of the virtual server you want to segregate.
3. On the screen that appears, click the Tools button, then click Segregate Virtual Server.
4. In the dialogue box that pops up, use the drop-down menu to choose a VS you want to keep away from.
5. Click the Segregate VS button to finish.
• No labels |
global_01_local_0_shard_00002368_processed.jsonl/46443 | U.S. DOE Combined Heat and Power
Installation Database
Add a CHP Site
Privacy Policy
This website was developed by ICF under contract to the U.S. Department of Energy (DOE). The site is hosted on ICF–maintained servers. All data and information contained or entered on this site will be maintained by ICF and will be made available to DOE.
This website uses a Google Analytics plugin to analyze user traffic. As a result, metadata from site visits is sent to Google to allow for aggregation and analysis of site traffic. |
global_01_local_0_shard_00002368_processed.jsonl/46462 | Is Your Consultant Really an Employee?
Do you wonder if your hire is really an employee?
So you want to hire an employee. Sometimes Consultants are often hired to supplement an organization’s staff while saving the costs of hiring a full-time employee. Consultants are experts in their field and are paid to share their knowledge and expertise to help solve problems and reach goals. While companies have many legitimate reasons for hiring consultants instead of employees, you should understand the differences to avoid potential tax liability.
In the United States, if the IRS determines that a consultant’s relationship to a client qualifies as an employer-employee relationship, the client is responsible for the employer’s portion of Social Security and Medicare taxes for the period the consultant was engaged (currently 7.65% of qualifying wages), but also penalties and interest. It is also essential the client contributes to unemployment compensation and holds workers’ compensation insurance. If the IRS cannot clearly identify whether the consultant paid income taxes on the money paid to the consultant, the client could also be held responsible for paying those taxes. So in the worst case, it’s possible that a client might have to pay nearly half of what they already paid the consultant to Uncle Sam.
In most industries, provisions exist to prevent this kind of catastrophe. So-called “safe harbor” rules seek to ensure that as long as your client engaged you as an independent contractor, in good faith (and not just to avoid employee status), then they cannot be held liable.
The IRS can punish offenders without warning, whether or not they were previously aware of their non-compliance. Many companies would rather stick with employees to eliminate that risk.
The IRS lists and describes twenty factors to be considered in differentiating between employees and independent contractors. Employers can use these factors, which were developed from past court cases and rulings, in evaluating their own workforces to determine that workers are appropriately classified.
It is important to understand that the weight to be given to each factor will vary depending on each individual situation. Often the occupation of the particular worker being classified will be of vital importance in determining which factors are most relevant. If you need assistance with classifications, contact us.
Based on the factors in the IRS Revenue Ruling 87-41, companies should assess their current practices in regard to their treatment of consultants and subcontractors for withholding and payroll tax purposes. Keep in mind that improper classification of employees as independent contractors could expose a company to substantial liability for the payment of back taxes if the IRS were to successfully challenge the treatment.
What can independent consultants do about this? Here is my understanding of an independent contractor. We hope this will provide you with some necessary guidance.
1. Instructions. Employers dictate how, where, and when work must be accomplished, while clients express a need that an independent consultant fills in their own way. Consultants know that, in practice, there are a lot of shades of grey here. Clients always have constraints on how they want the job done, and some employers give their employees just as much freedom in choosing implementation.
2. Training. If the client provides training for you, that demonstrates an employer relationship; to protect against this, you should always acquire your own training. If you really can’t afford to obtain the training that your client wants you to have, then you need to creatively structure your billing to cover the costs without making them pay for it directly.
3. Integration. This is another tricky one. To the degree that the success of your client’s business depends on your efforts, the same degree of employer control may be presumed. If your client can’t live without you, then you’re considered part of their organization. I know that a number of my clients would be vulnerable on that point.
4. Services rendered personally. If one specific individual must perform the work, then the individual may be considered an employee. That really hits independents hard, because we’re usually flying solo. I’ve had clients who insisted that our contract explicitly require me to perform all work personally.
5. Responsibility for Assistants. If you need assistance in performing your duties for the client, you should hire those Assistants yourself. If the Assistants are provided by the client, then you might be considered an employee. This is another area that usually trips us up, because it’s generally impossible for us to do our work without significant interaction with the client’s employees.
6. Continuing relationship. If the engagement does not have a discrete term, or even if the client keeps coming back to you time and again, that could be construed as an employee relationship. Consultants know that long-term clients are our bread and butter. I have several clients with whom I have had engagements of one form or another for several years now.
7. Hours of work. If the client establishes the hours during which you must perform the work, then they are your boss. This requirement is usually easy for independents to meet, because we like to set our own hours; however, I have had clients who insisted that I be available on a regular schedule and that pushes this point beyond the employer-employee relationship.
8. Full time. If you’re required to work for a single client full time, that’s waving the red cape in front of the IRS’s horns. You should never commit to full time for one client. Not only is it potentially a liability for them, but it’s putting all your eggs in their company’s basket.
9. Work on premises. If you’re required to perform the work at the client’s site, then you could be considered an employee. Many professional consultants generally don’t have a problem working remotely, but for those who must interact with the client on a day-to-day basis, this could be a problem. Just make sure the client doesn’t allocate a cubicle or office for you.
10. Order or sequence. When the client dictates the order of the steps you must take in order to produce a result, that’s considered employer control.
What does that say about project milestones? How closely does the person need to be under their control?
11. Oral or written reports. The requirement of regular progress reports also indicates control by the employer. Consultants know that regular communication with clients is absolutely essential to success. So you need to make those reports look like your firm is seeking feedback or that these reports are simply part of your deliverable services, rather than being required to “check in” by your client.
12. Payment by the hour, week, or month. Apparently, the IRS considers anything other than fixed price billing an indication of an employer-employee relationship. One way in which that can be made to appear more independent is to enumerate the accomplishments of each of those hours in your invoice, like lawyers do.
13. Expenses. If you cover your own expenses for your business and travel, you’re not an employee. I usually add these expenses into my agreements to prevent this issue from happening.
14. Tools and materials. You should purchase your own equipment, software licenses, membership affiliations, and office supplies. If your client pays for those, you could be considered their employee.
15. Significant investment. Employees generally aren’t required to make any investment in the services they provide, while independents who are running their own business must put up some money. Besides office space, equipment, supplies, and advertising, you also have your business licenses, taxes, subscriptions, and membership dues.
16. Profit or loss. If you’re truly independent, then any given engagement could result in a loss due to poor planning or unforeseen circumstances. Employees have no such risk. I try to mitigate my risk of loss by outlining all the terms of billing on a price schedule, given to my clients as part of an agreement.
17. More than one client. Similar to the full-time factor, having only one client indicates an employee relationship. This is an area many businesses have trouble proving. It makes perfect sense to have multiple clients, in addition to being tax savvy.
18. Publicly available. If you’re marketing your services to the general public, that argues for independence. In your quest to obtain new clients, document your expenditures for advertising and promotion in your agreement.
19. Right to discharge. Your agreement should state that either party may terminate for cause; this means that your client can’t just let you go on a whim — they must honor the contract unless you breach it. That makes you equal business partners, instead of employer/employee.
20. Right to terminate. The converse is also true. You should be bound by the terms of your contract, not working as an “employee at will.” I try to take some type of retainer to prevent this from happening.
Consultants bring a fresh approach, an outside eye to your business. They provide the extra horse-power and the specialized skills to help your business succeed. Dube Consulting would like to partner with your business.
17 thoughts on “Is Your Consultant Really an Employee?”
• Kelly,
I am not an attorney, but classifying employees with an employer – employee relationship is critical. As a 1099, do you work independently, self-directed and have your own business with other clients?
1. What is the law regarding independent contractors having their own workers’ compensation insurance (in CA)? Is this a requirement? I’m trying to find any writing or where I can get that information. Do you have any references? Thank you!
2. Hi,
Do these same rules apply if we were to hire someone internationally? Does it default to the international country guidelines?
3. What if a company based in the States hires an overseas consultant in Mexico and the consultant operates under a company name registered in South Africa? Ethically, where should he file his taxes?
4. I’m glad that your article mentions how an independent consultant can combat potential issues by working full time for a client. My mother’s looking to hire a tax consultant. I’ll be sure to send your article to them to help them out!
5. Our company would like to obtain a consulant as a COO. He doesn’t want to be considered an employee because it would be a conflict of interest to their other clients. How would we categorize him on our payroll, since we do want him to be our COO?
Leave a Comment |
global_01_local_0_shard_00002368_processed.jsonl/46465 | Control a man with your vagina
We all know it's good to flex your pelvic floors but this bizarre video takes it one step further, showing you how to strengthen your nether regions by lifting weights down there. International Sex coach Kim Anami has created a video tutorial teaching women how to build muscle down below to improve sex, intensify orgasms and make you the 'life of the party'. The vagina works the same way as biceps, it needs weight to create resistance in order to build strength. The vagina works the same way, it needs weight to create resistance in order to build strength.
nudist pageant free streamswinging baffled sump
big horny maturemens rio cut bikini underwearfree gay porno photosblood clots vagina
15 Men Describe The Perfect Vagina | Thought Catalog
It cleans itself. That's what vaginal discharge is for, after all. Having a clear or white-ish discharge is perfectly healthy, and it flushes out bacteria and old cells to prevent any unwanted pathogens from entering the uterus. So there's no need for you to come at your vagina with scented soaps —only baby shampoo, please—as you don't want to upset its pH balance. And for the love of all things healthy, don't douche.
obscene masturbation storiesdomination god givethbusty bri galleries long xxx
11 Things You Didn't Know Your Vagina Could Do
He sees a pretty girl and immediately enters his primal and virile "win-her-over" stage. Then it's up to the both of you to keep things creative. This is where you might have to pick up the slack, because a lot of decent men bless their hearts are just not that creative.
clip this nude world review
interracial justin porn site slayercaptain picard facepalmfriend finder sex in innsbruckamateur filmmakers contact
You know how, as women, we are constantly being reminded to enhance our appearance and increase our sex appeal so men will be attracted to us? How millions of straight women spend billions of dollars on clothes and beauty products to peacock around for some guy burping at the bar? The vagina is a sorceress concocting magical potions; the hormones our pleasure box produces have a power that is being tragically overlooked. Yes, really.
naked women spread eagle
39 0
• Zolojinn June 6, 2018
Can I take your order?
+15 -8
• Vibar October 10, 2018
Because someone always asks: At 0:30 from L to R: Daphne Dare, Cleo Clementine, Daisy Stone.
+13 -5
• Narn May 5, 2019
India has more sexuality than women half her age!
+17 -9
• Fejora October 10, 2018
Foot Fetish Fucking Hard And Dirty Foot cramped right as I finished, my experience has been ruined foolish in the library, the librarian is in shock)) fooking spicy Followed by aggressively ramming his dick at her ass.
+1 -6
• Grotaxe July 7, 2019
She so hot, one of my favorites!
+11 -10
Home Sex Dating |
global_01_local_0_shard_00002368_processed.jsonl/46470 | Paducah, Kentucky
From Wikipedia, the free encyclopedia
City of Paducah
Broadway downtown
Broadway downtown
Location of Paducah in McCracken County, Kentucky.
Location of Paducah in McCracken County, Kentucky.
Coordinates: 37°4′20″N 88°37′39″W / 37.07222°N 88.62750°W / 37.07222; -88.62750
Latitude and Longitude:
CountryUnited States
County McCracken
Settledc. 1821 [1]
Established1830 [2]
Incorporated1838 [2]
Named forthe Chickasaw Tribe [3]
• Type Council-Manager
• MayorBrandi Harless
• City ManagerJames Arndt
• City20.0 sq mi (51.8 km2)
• Land19.9 sq mi (51.5 km2)
• Water0.1 sq mi (0.3 km2)
341 ft (104 m)
( 2010)
• City25,024
• Estimate
(2018) [4]
• Metro
Time zone UTC−6 ( CST)
• Summer ( DST) UTC−5 ( CDT)
ZIP Code
Area code(s) 270 & 364
FIPS code21-58836
GNIS feature ID0500106
Paducah ( /pəˈdkə/) is a home rule-class city in and the county seat of McCracken County, Kentucky, United States. [5] The largest city in the Jackson Purchase region, it is located at the confluence of the Tennessee and the Ohio rivers, halfway between St. Louis, Missouri, to the northwest and Nashville, Tennessee, to the southeast. The population was 24,850 in 2018, [6] down slightly from 25,024 during the 2010 U.S. Census. [7] Twenty blocks of the city's downtown have been designated as a historic district and listed on the National Register of Historic Places.
Paducah is the hub of its micropolitan area, which includes McCracken, Ballard and Livingston counties in Kentucky and Massac County in Illinois.
Early history
Downtown Paducah
Paducah was first settled as "Pekin" around 1821 by European Americans James and William Pore. [3]
The town was laid out by explorer William Clark in 1827 and renamed Paducah. Although local lore long connected this to an eponymous Chickasaw chief "Paduke" and his tribe of "Paducahs", authorities on the Chickasaw have since said that there was never any chief or tribe of that name, or anything like it, nor any words like them in the Chickasaw language. Instead, it is thought that Clark named the town for the Comanche people, [3] who were known by the settlers as the Padoucas, from a Spanish rendering of the Kaw Pádoka. [8] or Omaha Pádoⁿka.) [9]
Incorporation, steamboats and railroads
Paducah was formally established as a town in 1830 and incorporated as a city by the state legislature in 1838. [2] By this time, steam boats traversed the river system, and its port facilities were important to trade and transportation. In addition, developing railroads began to enter the region. A factory for making red bricks, and a foundry for making rail and locomotive components became the nucleus of a thriving "River and Rail" economy.
In 1924 the Illinois Central Railroad began construction at Paducah of their largest locomotive workshop in the nation. Over a period of 190 days, a large ravine between Washington and Jones streets was filled with 44,560 carloads of dirt to enlarge the site, sufficient for the construction of 23 buildings. The eleven million dollar project was completed in 1927 as the fourth-largest industrial plant in Kentucky. The railroad became the largest employer in Paducah, having 1,075 employees in 1938. As steam locomotives were replaced through the 1940s and 1950s, the Paducah shops were converted to maintain diesel locomotives. A nationally known rebuilding program for aging diesel locomotives from Illinois Central and other railroads began in 1967. The shops became part of the Paducah and Louisville Railway in 1986. In the early 21st century they are operated by VMV Paducahbilt. [10]
Civil War
At the outset of the Civil War, Kentucky attempted to take a neutral position. However, when a Confederate force occupied Columbus, a Union force under General Ulysses S. Grant responded by occupying Paducah. Throughout most of the war, Col. Stephen G. Hicks was in charge of Paducah, and the town served as a massive supply depot for Federal forces along the Ohio, Mississippi, and Tennessee river systems.
On December 17, 1862, under the terms of General Order No. 11, US forces required 30 Jewish families to leave their long-established homes. Grant was trying to break up a black market in cotton, in which he suspected Jewish traders were involved. Cesar Kaskel, a prominent local Jewish businessman, dispatched a telegram of complaint to President Lincoln and met with him. As there were similar actions taken by other Jewish businessmen and loud complaints by Congress about the treatment of their constituents, Lincoln ordered the policy to be revoked within a few weeks.[ citation needed]
1937 flood
1884 flood
Flood Marker on Broadway (top marker 1937, near bottom 1913, bottom marker 1884)
Driven by 18 inches of rainfall in 16 days, along with sheets of swiftly moving ice, the '37 flood was the worst natural disaster in Paducah's history and elsewhere in the Ohio Valley. The earthen levee was ineffective against this flood. As a result, Congress authorized the United States Army Corps of Engineers to build the flood wall that now protects the city.
Atomic City
In 1950, the U.S. Atomic Energy Commission selected Paducah as the site for a new uranium enrichment plant. Construction began in 1951 and the plant opened for operations in 1952. Originally operated by Union Carbide, the plant has changed hands several times. Martin Marietta, its successor company Lockheed-Martin, and now the United States Enrichment Corporation have operated the plant in turn. The U.S. Department of Energy (DOE), successor to the AEC, remains the owner. The plant was closed in June 2013, and the Department of Energy began the process of decontaminating and shutting down the facilities.
Quilt City
On April 25, 1991, the National Quilt Museum opened in downtown Paducah. [12] The museum is a cultural destination that annually attracts an international array of more than 40,000 visitors to the Paducah area. The museum features professional quilt and fiber art exhibits that are rotated throughout the year. It is the largest single tourist attraction in the city.[ citation needed]
For more than 30 years, Paducah has been host to one of the largest quilt shows in North America, the American Quilter's Society "QuiltWeek Paducah". The American Quilter's Society, based in Paducah, now hosts two AQS QuiltWeek Paducah events annually, in April and September.[ citation needed]
According to the United States Census Bureau, the city has a total area of 20.0 square miles (52 km2), of which 19.9 square miles (52 km2) is land and 0.10 square miles (0.26 km2) (0.52%) is water. [13]
Paducah has a humid subtropical climate ( Köppen Cfa) with four distinct seasons and is located in USDA hardiness zone 7a. [14] Spring-like conditions typically begin in mid-to-late March, summer from mid-to-late-May to late September, with fall in the October–November period. Seasonal extremes in both temperature and precipitation are common during early spring and late fall; severe weather is also common, with occasional tornado outbreaks in the region. Winter typically brings a mix of rain, sleet, and snow, with occasional heavy snowfall and icing. The city has a normal January mean temperature of 34.6 °F (1.4 °C) and averages 13 days annually with temperatures staying at or below freezing; the first and last freezes of the season on average fall on October 25 and April 8, respectively. [15] Summer is typically hazy, hot, and humid with a July daily average of 78.9 °F (26.1 °C) and drought conditions at times. Paducah averages 48 days a year with high temperatures at or above 90 °F (32 °C). Snowfall averages 9.1 inches (23 cm) per season, contributing to the annual precipitation of 49.1 inches (1,250 mm). Extremes in temperature range from 108 °F (42 °C) on July 17, 1942 and June 29, 2012, down to −15 °F (−26 °C) on January 20, 1985. Paducah is prone to river flooding from the Ohio River, which is currently ongoing as of late February 2018, with the river expected to crest at 49 feet on February 28. [16]
Climate data for Paducah, Kentucky ( Barkley Regional Airport), 1981–2010 normals, extremes 1937–present
Record high °F (°C) 77
Average high °F (°C) 43.4
Average low °F (°C) 25.8
Record low °F (°C) −15
Average precipitation inches (mm) 3.68
Average snowfall inches (cm) 3.0
trace 0
trace 2.2
Average precipitation days (≥ 0.01 in) 9.6 8.7 10.4 10.8 11.3 9.1 8.5 6.9 6.8 7.8 9.9 10.4 110.2
Average snowy days (≥ 0.1 in) 2.4 2.3 0.7 0 0 0 0 0 0 0.1 0.1 1.6 7.2
Source: NOAA [15] [17]
Historical population
Census Pop.
Est. 201824,850 [4]−0.7%
U.S. Decennial Census [18]
2010 data
As of the census [7] of 2010, there were 25,024 people, 11,462 households, and 6,071 families residing in the city. The population density was 1,251.0 people per square mile (483.0/km²). There were 12,851 housing units at an average density of 642.5 per square mile (248.1/km²). The racial makeup of the city was 70.99% White, 23.67% African American, 0.22% Native American, 1.02% Asian, 0.02% Pacific Islander, 1.07% from other races, and 3.01% from two or more races. Hispanics or Latinos of any race were 2.68% of the population.
There were 11,462 households out of which 26.1% had children under the age of 18 living with them, 32.5% were married couples living together, 16.4% had a female householder with no husband present, 4.0% had a male householder with no wife present, and 47.0% were non-families. 41.5% of all households were made up of individuals and 15.7% had someone living alone who was 65 years of age or older. The average household size was 2.09 and the average family size was 2.84.
In the city, the population was spread out with 21.8% under the age of 18, 8.0% from 18 to 24, 24.4% from 25 to 44, 27.7% from 45 to 64, and 18.2% who were 65 or older. The median age was 41.4 years. For every 100 females, there were 85.2 males. For every 100 females age 18 and over, there were 81.2 males.
The median income for a household in the city was $31,220, and the median income for a family was $42,645. Males had a median income of $36,778 versus $27,597 for females. The per capita income for the city was $20,430. About 18.1% of families and 22.0% of the population were below the poverty line, including 34.3% of those under age 18 and 12.8% of those age 65 or over.
2000 census
As of the census [19] of 2000, there were 26,307 people, 11,825 households, and 6,645 families residing in the city. The population density was 1,350.2 people per square mile (521.4/km²). There were 13,221 housing units at an average density of 678.6/sq mi (262.0/km²). The racial makeup of the city was 72.78% White, 24.15% African American, 0.25% Native American, 0.64% Asian, 0.08% Pacific Islander, 0.55% from other races, and 1.56% from two or more races. Hispanic or Latino of any race were 1.38% of the population.
There were 11,825 households out of which 25.0% had children under the age of 18 living with them, 36.8% were married couples living together, 16.2% had a female householder with no husband present, and 43.8% were non-families. 39.3% of all households were made up of individuals and 17.3% had someone living alone who was 65 years of age or older. The average household size was 2.12 and the average family size was 2.84.
In the city the population was spread out with 22.5% under the age of 18, 8.5% from 18 to 24, 26.2% from 25 to 44, 22.5% from 45 to 64, and 20.3% who were 65 years of age or older. The median age was 40 years. For every 100 females, there were 83.4 males. For every 100 females age 18 and over, there were 77.9 males.
The median income for a household in the city was $26,137, and the median income for a family was $34,092. Males had a median income of $32,783 versus $21,901 for females. The per capita income for the city was $18,417. About 18.0% of families and 22.4% of the population were below the poverty line, including 33.8% of those under age 18 and 16.8% of those age 65 or over.
Dippin' Dots, the Paducah & Louisville Railway and several barge companies have their headquarters in Paducah. [20]
The river continues to be a prominent source of industry for Paducah. Twenty-three barge companies have their operating or corporate headquarters in Paducah. In 2017, the city of Paducah opened a 340-foot transient boat dock that provides space for transient boaters to enjoy Paducah by spending a few hours or spending several nights. Amenities include fuel (diesel and marine grade gasoline), water, power pedestals, and a sewer pumpout station (seasonal for water and sewer amenities).
A federal National Weather Service Forecast Office is based in Paducah, providing weather information to western Kentucky, southeastern Missouri, southern Illinois, and southwestern Indiana.
Top employers
According to Paducah's 2018 Comprehensive Annual Financial Report, [21] the top employers in the city were entities in health care, education and retail:
# Employer # of Employees
1 Baptist Healthcare Systems 1,611
2 Lourdes Hospital 1,177
3 Walmart 965
4 Paducah Public Schools 593
5 West Kentucky Community and Technical College 477
6 Claims Services Group, LLC 418
7 City of Paducah 394
8 Lowe's 365
9 Teletech Services Corporation 336
10 Credit Bureau Systems, Inc 299
Arts and culture
Paducah has been part of the UNESCO Creative Cities Network in the category of craft and folk art since November 2013. [22]
In 1996, the Paducah Wall to Wall mural program was begun by the Louisiana mural artist Robert Dafford and his team on the floodwall in downtown Paducah. [23] They have painted more than 50 murals addressing numerous subjects, including Native American history, [24] industries such as river barges [24] and hospitals, [25] local African-American heritage, [26] the historic Carnegie Library on Broadway Street, [27] steamboats, [26] and local labor unions. [28]
In May 2003, photographer Jim Roshan documented the painting of the Lewis and Clark Expedition mural during the America 24/7 project. One of the images was used in the book Kentucky24/7, published in 2004. [29]
By 2008 the mural project was completed and being maintained. Muralist Herb Roe returned to the city each year to repaint and refurbish the panels. [30] Roe is the only muralist associated with the project to have worked on all of the panels. [31] Roe added a new mural to the project in the summer of 2010. It shows the 100-year history of the local Boy Scout troop, Troop 1. [32] [33] Troop 1 is one of only a handful of troops who share their centennial with that of the national scouting organization itself. The dedication for the mural was held on National Scout Sunday, February 6, 2011. [34]
In 2017, artist Char Downs debuted the newest addition to the Wall to Wall mural program: a series of murals of award-winning quilts on the floodwall facing Park Street. Downs invested nearly 500 hours recreating Caryl Bryer Fallert-Gentry’s historic award-winning quilt Corona II: Solar Eclipse—the first quilt in the series—in her studio in Paducah’s Lower Town Arts District.
The Paducah Art Alliance has a program of Artist in Residencies to bring respected artists in to the city. In 2018 British Artist Ian Berry came and put on an exhibition to great acclaim. Ian is famed around the world with his art in denim, and fitted in with the textile art that Paducah is known for. [35] [36] [37] [38]
Lower Town Artist Relocation Program
In August 2000, Paducah's Artist Relocation Program was started to offer incentives for artists to relocate to its historic downtown and Lower Town areas. The program has become a national model for using the arts for economic development. It has received the Governors Award in the Arts, the Distinguished Planning Award from the Kentucky Chapter of the American Planning Association, the American Planning Association's National Planning Award, and most recently, the Kentucky League of Cities' Enterprise Cities Award.
Lower Town, home of the Artist Relocation Program, is the oldest neighborhood in Paducah. As retail commerce moved toward the outskirts of the city, efforts were made to preserve the architectural character, and historic Victorian structures were restored in the older parts of the city. The artists' housing program contributed to that effort and became a catalyst for revitalizing the downtown area. The Luther F. Carson Center for the Performing Arts was completed in downtown Paducah in 2004. [39]
UNESCO Creative City
On November 21, 2013, Paducah was designated by UNESCO as a Creative City of Crafts and Folk Art. Arts and cultural initiatives have included the Lower Town Artist Relocation program, the National Quilt Museum, Paducah "Wall to Wall" floodwall murals, and the Paducah School of Art and Design. Participation in the program has been criticized by local business owners and by Paducah's economic development council due to the financial cost to the city, and because the "UNESCO Creative Cities Network only benefits a small portion of Paducah's economy". [40] [41]
The Luther F. Carson Center for the Performing Arts was completed in downtown Paducah in 2004. [27] From Crosby, Still & Nash to Garrison Keillor, Shanghai Circus to STOMP, the Carson Center hosts touring Broadway productions, well-known entertainers, dramas, dance and popular faith-based and family series.
In September 2004, plans came together to highlight Paducah's musical roots through the redevelopment of the southern side of downtown. The centerpiece of the effort is the renovation of Maggie Steed's Hotel Metropolitan. [28] Prominent African-American musicians such as Louis Armstrong, Duke Ellington, Cab Calloway, Chick Webb's orchestra, B.B. King, Bobby "Blue" Bland, Ike and Tina Turner and other R & B and blues legends have performed here as part of what has become known as the " Chitlin' Circuit". Supporters want to promote Paducah's role in the history of American music.
Paducah is the birthplace and residence of musicians in various genres. Rockabilly Hall of Fame artists Ray Smith, whose recording of "Rockin' Little Angel" was a hit in 1960, and Stanley Walker, who played guitar for Ray Smith and others, grew up in Paducah. Terry Mike Jeffrey, an Emmy-nominated songwriter, is a resident of Paducah. Nashville, TN based composer/violinist, Mark Evitts, is also from Paducah. The most prominent mainstream artist is Steven Curtis Chapman, the top-selling Christian artist of all time.
Paducah is one of only two cities named in the world-famous song "Hooray for Hollywood", which is used as the opening number for the Academy of Motion Picture Arts and Sciences Awards (the Oscars). The 1937 song, with music by Richard Whiting and lyrics by Johnny Mercer, contains in the second verse: "Hooray for Hollywood! That phony, super Coney, Hollywood. They come from Chilicothes and Padukahs..."
Both cities were misspelled in the original published lyrics, though that may have been the fault of the publishers rather than Mercer. He was noted for his sophistication and the attention to detail he put into his lyrics. The correct spellings are "Chillicothe" and "Paducah".
Paducah was home to professional baseball's minor league Class D Kentucky–Illinois–Tennessee League (or KITTY League) Paducah Paddys (1903), Paducah Indians (1904–06, 1910, 1914, 1922–23, 1936–41), Paducah Polecats (1911), Paducah Chiefs (1912–13, 1951–55), and Paducah Redbirds (1935). The Chiefs competed in the Mississippi-Ohio Valley League from 1949 to 1950. [42]
The Chiefs played in J. Polk Brooks Stadium from its opening in 1948 until the KITTY League folded after the 1955 season. Since then, the ballpark has served as the home venue for Paducah Tilghman High School and American Legion Post 31 baseball teams, as well as various special baseball games and tournaments. In recent years, Brooks Stadium hosted the Ohio Valley Conference baseball tournament (2001–2009) and the National Club Baseball Association World Series (2015 and 2016). [43] [44] [45] Brooks Stadium currently is the home field for the Paducah Chiefs of the Ohio Valley Summer Collegiate Baseball League. [46]
In 1969, the Paducah Community College Indians won the National Junior College men's basketball championship.
The Paducah International Raceway is a 3/8-mile motorsport racetrack built in 1972.
Paducah operates under a council–manager form of city government. The Paducah Board of Commissioners is made up of the mayor and four commissioners elected at-large by the citizens on a non-partisan basis. The mayor is elected for a four-year term and commissioners each for a two-year term. The mayor and council select and appoint a city manager to operate the city.
Paducah Public Schools operates public schools serving most of the City of Paducah. Three K-5 elementary schools, Clark Elementary School, McNabb Elementary School and Morgan Elementary School, serve the city. All district residents are zoned to Paducah Middle School and Paducah Tilghman High School. [47]
Parts of the city and surrounding county are instead served by the McCracken County Public Schools. [48] Concord Elementary School and Reidland Elementary/Intermediate serve students through the 5th grade; Lone Oak Elementary School and Hendron–Lone Oak Elementary School end at the third grade, with 4th and 5th grade students in those schools' attendance zones attending Lone Oak Intermediate School. Middle school students in those areas may be zoned into Heath, Lone Oak, or Reidland Middle School. The county district began operating a single, consolidated McCracken County High School on August 9, 2013. The Paducah city district did not participate in this consolidation and Paducah Tilghman High School remains separate.
Paducah is also home to two private school systems, St. Mary High School and Community Christian Academy.
Higher education
West Kentucky Community and Technical College (WKCTC) is a member of the Kentucky Community and Technical College System and is a public, two-year, degree-granting institution serving the Western Region of Kentucky. There are approximately 6,200 students enrolled at the college. [49] WKCTC was rated as one of the top 10 community colleges in the United States by the Aspen Institute for 2011, 2013, 2015 and 2017. [50] [51]
There is a Paducah campus of the University of Kentucky College of Engineering located on the WKCTC campus.
There is also a Paducah campus of Murray State University, which offers approximately 20 bachelor's and master's degree programs. It has a 43,000-square-foot (4,000 m2) facility located on a 23-acre (9.3 ha) campus adjacent to WKCTC that was opened in 2014. [52]
Public library
Paducah has a lending library, the McCracken County Public Library. [53]
Local media in Paducah includes NBC affiliate WPSD-TV, MyNetworkTV affiliate WDKA, Fox affiliate KBSI, and the regional daily newspaper The Paducah Sun; the last two are both owned by Paxton Media Group. Six radio stations are located in Paducah; half of the stations are owned by Bristol Broadcasting Company. The weekly newspapers, the West Kentucky News and The Good Neighbor, enjoy significant readership.
The bi-monthly magazine Paducah Life [54] debuted in 1994 and continues publication today. The magazine features articles about life and residents in and around Paducah. Purchase Area Family Magazine, [55] a monthly publication distributed throughout Western Kentucky and Metropolis, Illinois, debuted in 2003. The magazine features a comprehensive calendar of events for the Purchase Area as well as unique articles about events, organizations and activities for families in the region.
Port Authority
• The Paducah-McCracken County Riverport Authority was established in 1964 by the legislative bodies of the County of McCracken and the City of Paducah under an equal ownership agreement. The Riverport Authority is a quasi-government agency that provides essential maritime services for the rural regions of Western Kentucky, Southern Illinois, Southeast Missouri, and Northwestern Tennessee. The agency specializes in bulk, agricultural, general, and containerized cargoes, and operates Foreign Trade Zone #294. It is the only United States Maritime Administration Marine Highway Designation on the Ohio River and the only Marine Highway port on the river that is designated for container on barge service. The authority owns the largest flat top crane in North America.[ citation needed]
Air service
Paducah Airport, 1938
• Pictograms-nps-airport.svg Barkley Regional Airport serves the area offering jet service to Chicago-O'Hare with two round trips daily connecting Paducah to 150 domestic and 19 international destinations. The airport is served by one commercial airline, United Express.
Interstate Highways
• I-24.svg Interstate 24 is a four-lane remote freeway that routes west to St. Louis and east to Nashville. The highway has a business loop that runs through downtown Paducah.
• I-66 (Future).svg Interstate 66 was planned to enter the city from the south and follow I-24 east to Eddyville, where it would then follow the existing Western Kentucky Parkway; however, after a Tier 1 environmental impact study (EIS) conducted by the Federal Highway Administration (FHWA) and the Illinois Department of Transportation under the 66 Corridor Study was cancelled on August 6, 2015, by IDOT, the I-66 Trans America Highway project as a whole was officially cancelled.
• I-69 (Future).svg Interstate 69 will follow the route of the existing Purchase Parkway to the south and east of Paducah, joining I-24/66 about 15 minutes east of Paducah. Once completed, it will connect the city north to Indianapolis and south to Memphis.
US highways
Notable people
See also
1. ^ University of Kentucky. Kentucky Atlas & Gazetteer, " Paducah". Accessed September 24, 2013.
2. ^ a b c Commonwealth of Kentucky. Office of the Secretary of State. Land Office. "Paducah, Kentucky". Accessed September 24, 2013.
3. ^ a b c Rennick, Robert. Kentucky Place Names, p. 224. University Press of Kentucky (Lexington), 1987. Accessed August 1, 2013.
6. ^ "US Census Quikfacts". Retrieved October 14, 2016.
8. ^ Rankin, Robert. English to Kanza Dictionary. "Comanche" & "Paducah". Accessed September 24, 2013.
9. ^ Omaha & Ponca Digital Dictionary. " Pádoⁿka". September 24, 2013.
10. ^ Holland, Richard (1994). Paducah: Portrait of a River Town. Paducah: Image Graphics. p. 39. ISBN 0-89145-625-2.
11. ^ Cherry, Robert C. National Register of Historic Places Inventory/Nomination: Mayor David A. Yeiser House. National Park Service, 1972-12-27, 9.
12. ^ Nickell, Patti (October 1, 2008). "Why visit Kentucky's Paducah? Because artists, preservationists and foodies think you should". Chicago Tribune. Retrieved October 15, 2018.
13. ^ "2010 Demographic Profile Data, Paducah, Kentucky: Geographic Identifiers". 2010 United States Census. United States Census Bureau. Retrieved May 31, 2011.
14. ^ United States Department of Agriculture. United States National Arboretum. USDA Plant Hardiness Zone Map [ archived March 3, 2015; Retrieved 2015-02-27].
15. ^ a b "NowData – NOAA Online Weather Data". National Oceanic and Atmospheric Administration. Retrieved February 27, 2015.
16. ^ "Paducah crews installing floodgates from rising Ohio River". WPSD Local 6 – Your News, Weather, & Sports Authority. February 25, 2018. Retrieved February 26, 2018.
17. ^ "Station Name: KY PADUCAH". National Oceanic and Atmospheric Administration. Retrieved February 27, 2015.
20. ^ " Dippin' Dots Contact Information". Dippin' Dots. Retrieved on March 5, 2010.
21. ^ "City of Paducah CAFR 2018" (PDF). Retrieved December 27, 2019.
22. ^ "Paducah, A UNESCO Creative City of Crafts & Folk Art | City of Paducah". Retrieved October 3, 2018.
23. ^ Paducah Wall to Wall-Paintings of Paducahs Past. Image Graphics Inc. 2008. p. 5. ISBN 0-9644699-9-5.
24. ^ a b Molly Harper (January 22, 2005). "Six panels to conclude 10-year painting project". The Paducah Sun.
25. ^ Andrew Parker (June 13, 2004). "Wind unveils Western Baptist's floodwall mural half-hour early". The Paducah Sun.
26. ^ a b "Paducah Wall to Wall-Paducah's History on Floodwall Murals". Retrieved March 31, 2010.
27. ^ Jimmy Nesbitt (October 31, 2004). "Snow-covered library mural a warm memory for backers". The Paducah Sun.
28. ^ "The Western Kentucky Worker-Labor floodwall mural dedicated in ceremony". Archived from the original on December 2, 2010. Retrieved March 28, 2010.
29. ^ Rick Smolan and David Elliot Cohen (September 27, 2004). Kentucky 24/7. Dorling Kindersley. p. 71. ISBN 0-7566-0057-X.CS1 maint: uses authors parameter ( link)
30. ^ "Small Town's Story Transforms Drab Walls into Art". Archived from the original on July 8, 2011. Retrieved March 23, 2010.
31. ^ Kathy Witt. "Floodwall Murals Color Our Cities". Kentucky Living. Archived from the original on July 18, 2011. Retrieved March 24, 2010.
32. ^ Byrne, Shelley (July 3, 2010). "Muralist to paint 100 years of Paducah Scouts". The Paducah Sun.
33. ^ Vick, Michael (July 12, 2010). "Painting begins for mural honoring local boy scouts". WPSD-TV. Archived from the original on July 18, 2011. Retrieved October 8, 2010.
34. ^ "Troop 1 Celebrates 100 Years Today". West Kentucky Star. Retrieved February 6, 2011.[ permanent dead link]
35. ^ "Ian Berry - Textile Artist - #PartakeInPaducah". Partake in Paducah. April 17, 2018. Retrieved June 29, 2018.
36. ^ "AQS & PAA team up for creative collaboration with "Master of Denim" artist from United Kingdom | Paducah Arts Alliance". Retrieved June 29, 2018.
37. ^ "Artist's work with denim stands out in quilting crowd". WPSD Local 6 - Your News, Weather, & Sports Authority. April 18, 2018. Retrieved June 29, 2018.
38. ^, LAUREL BLACK. "British artist found his best fit in denim". The Paducah Sun. Retrieved June 29, 2018.
39. ^ "Luther F Carson Center for the Performing Arts | History". Retrieved December 24, 2015.
40. ^ Capps, Thomas; Spissinger, Mike (July 30, 2018). "Is UNESCO Membership Worth the Cost for Paducah?". WPSD Local 6.
41. ^ Capps, Thomas; Jones, Justin (August 1, 2018). "Paducah Business Owners, Leaders Weigh in on UNESCO". WPSD Local 6.
42. ^ KITTY League website
43. ^ Brooks Stadium home page
44. ^ Ohio Valley Conference baseball record book
45. ^ "National Club Baseball Association World Series history" (PDF). Archived from the original (PDF) on February 2, 2017. Retrieved January 19, 2017.
46. ^ Paducah Chiefs page on Brooks Stadium website
47. ^ " Our Schools Archived July 21, 2011, at the Wayback Machine". Paducah Public Schools. Retrieved on October 17, 2010.
48. ^ "Paducah Public Schools Boundaries". Kentucky Department of Revenue. 1996. Archived from the original on October 3, 2011. Retrieved May 31, 2011. Compare with the current city limits of Paducah, available in this PDF map from the Kentucky Transportation Cabinet.
49. ^ "College at a Glance | WKCTC". Retrieved May 14, 2019.
50. ^ "Florida's Valencia College Named Top US Community College". The Aspen Institute. Retrieved May 14, 2019.
51. ^ "Past Winners and Finalists". The Aspen Institute’s College Excellence Program. Retrieved May 14, 2019.
52. ^ Jeseo, Jared; Editor, Online. "Paducah regional campus opens, lets first students through doors". Retrieved May 14, 2019.CS1 maint: extra text: authors list ( link)
53. ^ "Kentucky Public Library Directory". Kentucky Department for Libraries and Archives. Retrieved June 7, 2019.
54. ^ "Home – Paducah Life". Retrieved December 24, 2015.
55. ^ "Purchase Family Magazine". Purchase Family Magazine. Retrieved December 24, 2015.
56. ^ Slotnick, Daniel E. "Roy Skinner, Who Recruited First Black Basketball Player in SEC, Dies at 80", The New York Times, October 30, 2010. Accessed October 31, 2010.
57. ^ Rockabilly Hall of Fame: Ray Smith
External links |
global_01_local_0_shard_00002368_processed.jsonl/46474 | For historical reasons I happen to have two accounts on Amazon, and I would prefer to keep both, as they are in different countries.
I have ebooks in both accounts. Can I access both accounts with the same kindle or kindle app and download the books from both?
How can I do it?
• You could try adding one of your accounts as a family member and sharing the books with that account. I don't know if this would work between Amazon accounts between countries, but please let us know. – William Jan 19 '19 at 20:14
I asked the same question to an Amazon customer service. The answer I got was NO. I did recommended them to design a way to allow users to link their multiple accounts in whatever countries.
What I'm doing now is using an Android simulator on my desktop computer, where I can run a separate Kindle app and use a different Kindle account. The Android simulator I'm using is bluestack, and TBH it's not a bad experience.
But I'm still struggling to find a way doing so on my iPhone and iPad... Hope someone else can update the answer.
• Welcome to ebooks-SE. I know the Kindle app for android does work on an android simulator, because I have that on my smartphone, which is a Linux phone. But I do not like the Kindle app for android because it receives only encrypted versions of ebooks, in a format that is understood only by the android app, even when the book is not supposed to have DRM. It is not the same format as the one used for Windows or Mac Kindle apps. Hence I cannot manage privately my ebooks, and my kindle app will know only one account. I always feel that Amazon is doing its best to give me a hard time. – babou Dec 23 '18 at 13:33
My answer shouldn't be treated as definitive, but I did google around a bit.
One youtuber claims that he can access books from two accounts by logging off the device with his original account, logging on with the second account, downloading the ebooks locally, logging off again and then relogging with the original account. https://www.youtube.com/watch?v=UqSgRmTxwyM
Youtube commenters are skeptical -- and so am I.
You can try, but you might screw up one or both accounts in the process.
Amazon has a method to link ebooks within different accounts within a family -- but there are strict rules about eligibility, plus I highly doubt it would apply to accounts for amazons from different countries. https://www.amazon.com/gp/help/customer/display.html?nodeId=201733400
In my opinion (I'm speculating here) one solution might involve having two separate instances of an app running on a device -- one with each account. I don't think it's feasible though on either android or ios or native kindles.
Perhaps if you could find the unencrypted versions of the files you could transfer them to a second app capable of reading .mobi files. (I know you asked a question about that a little while ago). Perhaps you can use an app like fbreader to read unencrypted .mobi files . https://fbreader.org/content/book-formats-supported-and-not-supported
It seems easier just to have two separate devices with different accounts registered on each one.
Here's a wild idea -- why not write the Amazon people and ask them if they might consider transferring ownership of the files from one account to the other -- especially if you can demonstrate that you own both of them. I'm guessing that you aren't the ONLY Amazon.com customer who has moved to a different country. After all, you clearly have bought the ebooks in question. (Don't keep your hopes up!
Amazon let me do this by setting up a “family”, but my other account is my business.
• 1
Welcome to ebooks-SE. Thanks for this good suggestion, which actually was already made previously (by idiotprogrammer). However, it is unlikely to be accepted for 2 accounts in different countries. Duplicating an answer is no big issue for a new user, but some people react negatively when you duplicate answers ... though in your case you add the fact that you did it successfully. – babou Mar 30 '19 at 11:56
• I saw his post, but it didn't touch on the business account aspect. I think that's why I'm allowed to have them linked, because that way it's not considered an arbitrary duplicate account. – Maria Apr 2 '19 at 23:28
• Good remark. My comment was made because you are new here, and I wanted to warn you that some people are touchy on principle, and sometimes because they do not see the extra contribution. It occasionally helps to be specific about it in contrasting with previous answers. Another possibility is to simply ignore unwarranted negative comments and downvotes. BTW, someone did downvote you without waiting for your explanation ... and he cannot undo it. – babou Apr 3 '19 at 0:45
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/46493 | Search The Blog
What Do Your Friends See in You?
Posted May 31, 2016
snowboard instruction
So I ask you: Are your friends aligned with your highest purpose? How does their view of the world — and their view of you — affect your future?
Click here for the blog on Patheos.
How to Survive This Election Cycle
Posted May 25, 2016
old campaign buttonsI'll confess, as I watch campaign coverage, I sometimes shake my head and cluck my tongue like an old woman.
I struggle to find the spiritual lessons in this upheaval we're going through to choose the next president.
Then I remembered, this is a hallway! This is a place between what has been and what will be, a time of uncertainty that can be difficult, painful, scary or downright hell.
We have the same opportunities in a mass hallway that we do in our personal hallways — no less than transformation. That's what the blog is about this week.
Read it here.
The Answer to Why
Posted May 17, 2016
Every job has parts that are drudgery, but we do them anyway.
That's the question - why do you do what you do? Is it rewarding, fun, challenging, at least most of the time? It's important to know why.
I ran a cross a wonderful video called “Know Your Why” and wanted to share it with you this week. It's on my blog today at Patheos.
photo by Katie Sayer on flickr CC
Killing Your Darlings
Posted May 10, 2016
men in old-time newsroom
You won't be surprised to learn that as a writer, I spend a lot of time editing.
And editing turns out to be a pretty good metaphor for life.
What isn't quite working? What is overdone or droning on too long? Where is the superfluous fluff, the parts that aren't necessary to the arc of your story?
The trouble is, sometimes we have to cut our favorite bits, the parts we're attached to. In the newsroom, we called it “killing your darlings.”
I blogged about it this week on Patheos.
Knuckleheads: 3 Reasons to Let Them Live
Posted May 3, 2016
frustrated woman in traffic
I will grant you, I write pretty often about how to handle annoying and difficult people. (I hope that doesn't annoy you!)
The reason is not because I'm so irritable — well, that's not the only reason — but because other people keep asking me how to deal with life's minor-to-medium conflicts.
Unless you're really Zen, you might be giving a lot of your energy to people or events that don't go the way you'd prefer, even knowing you can't change them and can only choose your reaction.
So I blogged about it (again) today in the hope of finding some clarity. It is here on Patheos — a quick read. Let me know if you have better ideas for dealing with annoyances!
©2013 Ellen Debenport
Phone: (214) 797-1468
Creative Design by |
global_01_local_0_shard_00002368_processed.jsonl/46494 | Commit 6511485f authored by Glenn Morris's avatar Glenn Morris
More small TODO updates
parent 90790560
......@@ -399,14 +399,6 @@ rather than interactively. This a trivial one-liner in easy-mode.el.
Check the assignments file for other packages which might go in and
have been missed.
** Possibly install python-mode in place of python.el, or combine the two.
Someone needs to do the work of figuring out who all the non-trivial
python-mode.el contributors are and getting assignments.
** Make keymaps a first-class Lisp object (this means a rewrite of
keymap.c). What should it do apart from being opaque ?
multiple inheritance ? faster where-is ? no more fix_submap_inheritance ?
......@@ -416,7 +408,7 @@
an example how to do part of this; see the XMenu* functions on msdos.c.
** Implement popular parts of the rest of the CL functions as compiler
macros in cl-macs.
macros in cl-macs. [Is this still relevant now that cl-lib exists?]
** Make compiler warnings about functions that might be undefined at run time
smarter, so that they know which files are required by the file being
......@@ -457,7 +449,8 @@
** Allow unknown image types to be rendered via an external program
converting them to, say, PBM (in the same way as PostScript?). [does
doc-view.el do this, or could it be extended to do this?]
Does ImageMagick obsolete this idea?]
** Allow displaying an X window from an external program in a buffer,
e.g. to render graphics from Java applets. [gerd and/or wmperry
......@@ -615,6 +608,7 @@
There is a special trick to detect mouse press in the lower right
corner and track mouse movements, but this does not work well, and is
not scalable to the new Lion "resize on every window edge" behavior.
[As of trunk r109635, 2012-08-15, the event loop no longer polls.]
**** (mouse-avoidance-mode 'banish) then minimize Emacs, will pop window back
up on top of all others
......@@ -721,12 +715,6 @@ images with lower bit depth.
*** Decide what to do with some uncommitted imagemagick support
functions for image size etc.
*** Test with more systems.
Tested on Fedora 12, 14, and the libmagick that ships with it.
I also tried using an ImageMagick compiled from their SVN, in
parallel with the one packaged by Fedora, it worked well.
Ubuntu 8.04 was tested, but it seems it ships a broken ImageMagick.
** nxml mode
*** High priority
Markdown is supported
0% or
Finish editing this message first!
Please register or to comment |
global_01_local_0_shard_00002368_processed.jsonl/46503 | John H. Watson, known as Dr. Watson, is a fictional character in the Sherlock Holmes stories by Sir Arthur Conan Doyle. Watson is Sherlock Holmes' friend, assistant and sometime flatmate, and the first person narrator of all but four of these stories. He is described as the typical Victorian-era gentleman, unlike the more eccentric Holmes. He is astute, although he fails to match his friend's deductive skills. Whilst retaining his role as Holmes's friend and confidant, Watson has been adapted in various films, television series, video games, comics and radio programmes.
Dr. Watson
Sherlock Holmes character
Dr. Watson (left) and Sherlock Holmes, by Sidney Paget.
First appearanceA Study in Scarlet
Last appearanceHis Last Bow
Created byArthur Conan Doyle
Full nameJohn H. Watson
FamilyH. Watson Sr. (father; deceased)
SpouseMary Morstan (1889 – c. 1900)
Second unnamed wife (c. 1903–??)
Alma materSt Bartholomew's Hospital Medical College
Character creationEdit
Arthur Conan Doyle (1859–1930), creator of Sherlock Holmes and Dr Watson. Photo from 1914
In Conan Doyle's early rough plot outlines, Sherlock Holmes's associate was named "Ormond Sacker"[1][2] before Conan Doyle finally settled on "John Watson". He was probably inspired by one of Doyle's colleagues, Dr James Watson. William L. DeAndrea wrote that "Watson also serves the important function of catalyst for Holmes's mental processes... From the writer's point of view, Doyle knew the importance of having someone to whom the detective can make enigmatic remarks, a consciousness that's privy to facts in the case without being in on the conclusions drawn from them until the proper time. Any character who performs these functions in a mystery story has come to be known as a 'Watson'."[citation needed]
Fictional character biographyEdit
Dr Watson's first name is mentioned on only four occasions. Part one of the very first Sherlock Holmes story, A Study in Scarlet, is subtitled Being a reprint from the Reminiscences of John H. Watson, M.D., Late of the Army Medical Department.[3] The preface of the collection His Last Bow is signed "John H. Watson, M.D.", and in "The Problem of Thor Bridge", Watson says that his dispatch box is labelled "John H. Watson, M.D."[4] His wife Mary Watson appears to refer to him as "James" in "The Man with the Twisted Lip"; Dorothy L. Sayers speculates that Mary may be using his middle name Hamish (an Anglicisation of Sheumais, the vocative form of Seumas, the Scottish Gaelic for James), though Doyle himself never addresses this beyond including the initial.[5] David W. Merrell, on the other hand, concludes that Mary is not referring to her husband at all but rather to (the surname of) their servant.[6]
In A Study in Scarlet, Watson, as the narrator, establishes having studied at St Bartholomew's Hospital in London, receiving his medical degree from the University of London in 1878, and subsequently being trained at Netley as an assistant surgeon in the British Army. (In a non-canonical story, "The Field Bazaar", Watson is described as having received his Bachelor of Medicine from Doyle's alma mater, Edinburgh University; this would likely have been in 1874.)[7] He joined British forces in India with the 5th Northumberland Fusiliers before being attached to the 66th (Berkshire) Regiment of Foot, saw service in the Second Anglo-Afghan War, was wounded at the Battle of Maiwand (July 1880) by a jezail bullet,[a] suffered enteric fever and was sent back to England on the troopship HMS Orontes following his recovery.[8] With his health ruined, he was then given a daily pension of 11 shillings and 6 pence[b] for nine months.[8]
In 1881, Watson is introduced by his friend Stamford to Sherlock Holmes, who is looking for someone to share rent at a flat in 221B Baker Street. Concluding that they are compatible, they subsequently move into the flat. When Watson notices multiple eccentric guests frequenting the flat, Holmes reveals that he is a "consulting detective" and that the guests are his clients.[8]
Watson witnesses Holmes's skills of deduction on their first case together, concerning a series of murders related to Mormon intrigue. When the case is solved, Watson is angered that Holmes is not given any credit for it by the press. When Holmes refuses to record and publish his account of the adventure, Watson endeavours to do so himself. In time, Holmes and Watson become close friends.
In The Sign of the Four, John Watson becomes engaged to Mary Morstan, a governess. In "The Adventure of the Empty House", a reference by Watson to "my own sad bereavement" implies that Morstan has died by the time Holmes returns after faking his death; that fact is confirmed when Watson moves back to Baker Street to share lodgings with Holmes. In "The Adventure of the Blanched Soldier" (set in January 1903), Holmes mentions that "Watson had at that time deserted me for a wife", but this wife was never named or described.
At the beginning of A Study in Scarlet, Watson states he had "neither kith nor kin in England". In the Sign of the Four, it is established his father and older brother are deceased, and both shared the initial 'H', when Holmes examines an old watch in Watson's possession, formerly his father's before inherited by his brother. Holmes estimates the watch to have a value of 50 guineas.[c] Holmes deduced from the watch that Watson's brother was "a man of untidy habits—very untidy and careless. He was left with good prospects but threw away his chances, lived for some time in poverty with occasional short intervals of prosperity and finally, taking to drink he died".
Watson as Holmes's biographerEdit
Throughout Doyle's novels, Watson is presented as Holmes's biographer. At the end of the first published Holmes story, A Study in Scarlet, Watson is so incensed by Scotland Yard's claiming full credit for its solution that he exclaims: "Your merits should be publicly recognised. You should publish an account of the case. If you won't, I will for you". Holmes suavely responds: "You may do what you like, Doctor".[10] Therefore, the story is presented as "a reprint from the reminiscences of John H. Watson", and most other stories of the series share this by implication.[8]
In the first chapter of The Sign of Four, Holmes comments on Watson's first effort as a biographer: "I glanced over it. Honestly, I cannot congratulate you upon it. Detection is, or ought to be, an exact science and should be treated in the same cold and unemotional manner. You have attempted to tinge it with romanticism... The only point in the case which deserved mention was the curious analytical reasoning from effects to causes, by which I succeeded in unravelling it"; whereupon Watson admits, "I was annoyed at this criticism of a work which had been specially designed to please him. I confess, too, that I was irritated by the egotism which seemed to demand that every line of my pamphlet should be devoted to his own special doings".[11]
In "The Adventure of Silver Blaze", Holmes confesses: "I made a blunder, my dear Watson—which is, I am afraid, a more common occurrence than anyone would think who only knew me through your memoirs"; and in The Hound of the Baskervilles, chapters 5–6, Holmes says: "Watson, Watson, if you are an honest man you will record this also and set it against my successes!"; whereas in his prologue to "The Adventure of the Yellow Face", Watson himself remarked: "In publishing these short sketches [of Holmes's cases] ... it is only natural that I should dwell rather upon his successes than upon his failures", on grounds that where Holmes failed, often nobody else succeeded.
Sometimes Watson (and through him, Conan Doyle) seems determined to stop publishing stories about Holmes: in "The Adventure of the Second Stain", Watson declares that he had intended the previous story (“The Adventure of the Abbey Grange”) "to be the last of those exploits of my friend, Mr Sherlock Holmes, which I should ever communicate to the public", but later decided that "this long series of episodes should culminate in the most important international case which he has ever been called upon to handle" ("The Second Stain" being that case). Despite this, it was succeeded by twenty other stories.
In the later stories, written after Holmes's retirement (c. 1903–04), Watson repeatedly refers to "notes of many hundreds of cases to which I have never alluded”, on grounds that after Holmes's retirement, the detective showed reluctance "to the continued publication of his experiences. So long as he was in actual professional practice the records of his successes were of some practical value to him, but since he has definitely retired...notoriety has become hateful to him" ("The Adventure of the Second Stain"). After Holmes's retirement, Watson often cites special permission from his friend for the publication of further stories; but received occasional unsolicited suggestions from Holmes of what stories to tell, as noted at the beginning of "The Adventure of the Devil's Foot".
In "The Adventure of the Blanched Soldier", one of only two stories narrated by Holmes himself, the detective remarks about Watson: "I have often had occasion to point out to him how superficial are his accounts and to accuse him of pandering to popular taste instead of confining himself rigidly to facts and figures"; but the narrative style seldom differs, and Holmes confesses that Watson would have been the better choice to write the story, noting when he starts writing that he quickly realizes the importance of presenting the tale in a manner that would interest the reader. In any case, Holmes regularly referred to Watson as my "faithful friend and biographer", and once exclaims, "I am lost without my Boswell".
At the beginning of "The Adventure of the Veiled Lodger", Watson makes strong claims about "the discretion and high sense of professional honour" that govern his work as Holmes's biographer, but which do not keep Watson from expressing himself and quoting Holmes with candour of their antagonists and their clients. In "The Red-Headed League", for example, Watson introduces Jabez Wilson: "Our visitor bore every mark of being an average commonplace British tradesman, obese, pompous, and slow"—wearing "a not over-clean black frock-coat".
Personal characteristicsEdit
Physical appearanceEdit
In A Study in Scarlet, having just returned from Afghanistan, John Watson is described "as thin as a lath and as brown as a nut."[12] In subsequent texts, he is variously described as strongly built, of a stature either average or slightly above average, with a thick, strong neck and a small moustache.[13]
Watson used to be an athlete: it is mentioned in "The Adventure of the Sussex Vampire" (1924) that he used to play rugby union for Blackheath (a famous old London club), but he fears his physical condition has declined since that point. In "The Adventure of Charles Augustus Milverton" (1899), Watson is described as "a middle-sized, strongly built man—square jaw, thick neck, moustache..." In "His Last Bow", set in August 1914, Watson is described as "...a heavily built, elderly man with a grey moustache...".
Watson reading bad news to Holmes in "The Five Orange Pips". One of Sidney Paget's iconic illustrations from The Strand magazine.
Skills and personalityEdit
John Watson is intelligent, if lacking in Holmes's insight, and serves as a perfect foil for Holmes: the archetypal late Victorian / Edwardian gentleman against the brilliant, emotionally detached analytical machine. Furthermore, he is considered an excellent doctor and surgeon, especially by Holmes. For instance, in "The Adventure of the Dying Detective," Holmes creates a ruse that he is deathly ill to lure a suspect to his presence, which must fool Watson as well during its enactment. To that effect in addition to elaborate makeup and starving himself for a few days for the necessary appearance, Holmes firmly claims to Watson that he is highly contagious to the touch, knowing full well that the doctor would immediately deduce his true medical condition upon examination.
Watson is well aware of both the limits of his abilities and Holmes's reliance on him:
Watson sometimes attempts to solve crimes on his own, using Holmes's methods. For example, in The Hound of the Baskervilles, Watson efficiently clears up several of the many mysteries confronting the pair including Barrymore's strange candle movements turning out to be signals to his brother-in-law Seldan, and Holmes praises him for his zeal and intelligence. However, because he is not endowed with Holmes's almost-superhuman ability to focus on the essential details of the case and Holmes's extraordinary range of recondite, specialised knowledge, Watson meets with limited success in other cases. Holmes summed up the problem that Watson confronted in one memorable rebuke from "A Scandal in Bohemia": "Quite so... you see, but you do not observe." In "The Adventure of the Solitary Cyclist," Watson's attempts to assist Holmes's investigation prove unsuccessful because of his unimaginative approach, for example, asking a London estate agent who lives in a particular country residence. (According to Holmes, what he should have done was "gone to the nearest public house" and listened to the gossip.) Watson is too guileless to be a proper detective. And yet, as Holmes acknowledges, Watson has unexpected depths about him; for example, he has a definite strain of "pawky humour", as Holmes observes in The Valley of Fear.
Watson and Holmes in a Sidney Paget illustration for "The Adventure of Silver Blaze".
Watson never masters Holmes's deductive methods, but he can be astute enough to follow his friend's reasoning after the fact. In "The Adventure of the Norwood Builder," Holmes notes that John Hector McFarlane is "a bachelor, a solicitor, a Freemason, and an asthmatic". Watson comments as narrator: "Familiar as I was with my friend's methods, it was not difficult for me to follow his deductions, and to observe the untidiness of attire, the sheaf of legal papers, the watch-charm, and the breathing which had prompted them." Similar episodes occur in "The Adventure of the Devil's Foot," "The Adventure of the Solitary Cyclist," and "The Adventure of the Resident Patient." In "The Adventure of the Red Circle", we find a rare instance in which Watson rather than Holmes correctly deduces a fact of value.[d] In The Hound of the Baskervilles,[14] Watson shows that he has picked up some of Holmes's skills at dealing with people from whom information is desired. (As he observes to the reader, "I have not lived for years with Sherlock Holmes for nothing." )
Watson is endowed with a strong sense of honour. At the beginning of "The Adventure of the Veiled Lodger," Watson makes strong claims about "the discretion and high sense of professional honour" that govern his work as Holmes's biographer, but discretion and professional honour do not block Watson from expressing himself and quoting Holmes with remarkable candor on the characters of their antagonists and their clients. Despite Watson's frequent expressions of admiration and friendship for Holmes, the many stresses and strains of living and working with the detective make themselves evident in Watson's occasional harshness of character. The most controversial of these matters is Watson's candor about Holmes's drug use. Though the use of cocaine was legal and common in Holmes's era, Watson directly criticizes Holmes's habits.
Watson is also represented as being very discreet in character. The events related in "The Adventure of the Second Stain" are supposedly very sensitive: "If in telling the story I seem to be somewhat vague in certain details, the public will readily understand that there is an excellent reason for my reticence. It was, then, in a year, and even in a decade, that shall be nameless, that upon one Tuesday morning in autumn we found two visitors of European fame within the walls of our humble room in Baker Street." Furthermore, in "The Adventure of the Veiled Lodger," Watson notes that he has "made a slight change of name and place" when presenting that story. Here he is direct about a method of preserving discretion and confidentiality that other scholars have inferred from the stories, with pseudonyms replacing the "real" names of clients, witnesses, and culprits alike, and altered place-names replacing the real locations.
Holmes (William Gillette, right) with Dr Watson (Bruce McRae, left), in the 1899 Broadway production of Sherlock Holmes
Bruce McRae created the character of Dr Watson in the 1899 Broadway production of Sherlock Holmes, a play by William Gillette and Arthur Conan Doyle.
Edward Fielding played Watson in the 1916 film Sherlock Holmes
Roland Young played Watson in the 1922 film Sherlock Holmes
Ian Fleming played Watson in the 1931 Sherlock Holmes film series except for The Sign of Four in which he was played by Ian Hunter.
Athole Stewart played Watson in the 1931 film The Speckled Band
Reginald Owen played Watson in the 1932 film Sherlock Holmes
Warburton Gamble played Watson in the 1933 film A Study in Scarlet
The series of Sherlock Holmes films with Basil Rathbone as Holmes and Nigel Bruce as Watson portrayed the doctor as a lovable but incompetent assistant.[15] Some later treatments have presented a more competent Watson.
Holmes and Watson (right), as they appear in Sherlock Holmes: The Case of the Silver Earring video game
Watson was played by actor André Morell in the 1959 film version of The Hound of the Baskervilles, wherein Morell preferred that his version of Watson should be closer to that originally depicted in Conan Doyle's stories, not Nigel Bruce's interpretation.[16] Other depictions include Robert Duvall opposite Nicol Williamson's Holmes in The Seven-Per-Cent Solution (1978); Donald Houston, who played Watson to John Neville's Holmes in A Study in Terror (1965); a rather belligerent, acerbic Watson portrayed by Colin Blakely in Billy Wilder's The Private Life of Sherlock Holmes (1970), in which Holmes was played by Robert Stephens (who starts the rumour that they are homosexual lovers to discourage female interest); and James Mason's portrayal in Murder by Decree (1978), with Christopher Plummer as Holmes. Alan Cox played a teenage Watson in the 1985 film Young Sherlock Holmes, narrated by Michael Hordern as an older Watson. Ian Hart portrayed a young, capable, and fit Watson twice for BBC Television, once opposite Richard Roxburgh as Holmes (in a 2002 adaptation of The Hound of the Baskervilles) and for a second time opposite Rupert Everett as the Great Detective in the new story Sherlock Holmes and the Case of the Silk Stocking (2004).
In the Soviet Sherlock Holmes film series, directed by Igor Maslennikov, Dr Watson was played by Vitaly Solomin. He is portrayed as a brave and intelligent man, but not especially physically strong.
In the 1988 parody film Without a Clue, the roles of a witless Watson and an extremely intelligent Holmes are reversed. In the film, Holmes (Michael Caine) is an invention of Watson (Ben Kingsley) played by an alcoholic actor; when Watson initially offers suggestions on how to solve a case to some visiting policemen, he is at the time applying for a post in an exclusive medical practice, and so invents the fictional Holmes to avoid attracting attention to himself, continuing the "lie" of Holmes's existence after he fails to get the post. At the same time, Watson becomes increasingly frustrated that his own talents are unrecognised, and unavailingly attempts to win celebrity for himself as "the Crime Doctor."[17]
In the Guy Ritchie-directed Sherlock Holmes movies, Watson is portrayed by Jude Law. Law portrays Watson as knowledgeable, brave, strong-willed, and thoroughly professional, as well as a competent detective in his own right. Apart from being armed with his trademark sidearm, his film incarnation is also a capable swordsman. The film portrays Watson as having a gambling problem, which William S. Baring-Gould had inferred from a reference in "The Adventure of the Dancing Men" to Holmes keeping Watson's cheque book locked in a drawer in his desk.[18] Law also portrayed Watson in the 2011 sequel, Sherlock Holmes: A Game of Shadows.
Watson appears on the 2010 direct-to-DVD Asylum film Sir Arthur Conan Doyle's Sherlock Holmes, a science fiction reinvention in which he was portrayed by actor Gareth David-Lloyd. At the beginning of the film, Watson is an elderly man portrayed by David Shackleton during the Blitz in 1940. He tells his nurse the tale of the adventure which he and Holmes vowed never to tell the public. In 1889, he is a home doctor and personal physician and biographer of Sherlock Holmes (Ben Syder). Here, Watson is portrayed as easily confused by Holmes's abilities, but the story is set in 1881, the same year as A Study in Scarlet, which may account for this. He is a skilled gunman and is loyal, if often irritated, by Holmes's methods.
Watson, portrayed by Colin Starkey, appears briefly in the 2015 film Mr. Holmes (although he has no dialogue and his face is not shown). Reflecting on his career as a detective, Holmes (Ian McKellen) comments that Watson took considerable latitude in writing up the cases for publication, to the point that he views the finished products as little more than "penny dreadfuls." Holmes remarks that several key details of his literary counterpart, including his pipe, deerstalker hat, and 221B Baker Street address, were entirely fictitious.
The 2015 mashup anime film The Empire of Corpses features a younger, re-imagined Watson as the protagonist, in a steampunk world where the dead are reanimated and used as a labor force. He was voiced by Yoshimasa Hosoya in Japanese, and Jason Liebrecht in the English dub.
Examples of a more competent Watson on television are the portrayals by David Burke and later by Edward Hardwicke in the 1980s and 1990s television series The Adventures of Sherlock Holmes, The Return of Sherlock Holmes, The Casebook of Sherlock Holmes and The Memoirs of Sherlock Holmes, all starring Jeremy Brett as Holmes.
The 1950s Sherlock Holmes US TV series featured Howard Marion-Crawford as a stable Watson with a knockout punch.
In the TV series, Sherlock Holmes in the 22nd Century, Holmes acquires a 'new' Watson in the form of a robot. The robot, having absorbed all lore of the original, believes itself to be Watson, and Holmes treats it as such, concluding that the "spirit" is Watson's though the "body" is not.
The character of Alexandra Eames (as portrayed by Kathryn Erbe) in Law & Order: Criminal Intent is loosely based on the character of Doctor Watson. The series ran from 2001-2011.
In the 2010 BBC television show Sherlock, Martin Freeman portrays Watson as a discharged military doctor who strikes a complicated yet good friendship with the brilliant but eccentric Holmes (Benedict Cumberbatch). As with the original character, Watson served in the British Army in Afghanistan. The adaptation is set in contemporary London.
The 2012 CBS show Elementary changes the character to an Asian American woman, Dr Joan H. Watson (Lucy Liu), an ex-surgeon turned sober companion. She is appointed to monitor the recovery of former heroin addict Sherlock Holmes (Jonny Lee Miller), but takes to detective work, becoming his protégée and eventually his partner. The adaptation is set in New York.
In the 2013 Russian adaptation Sherlock Holmes, Dr Watson is portrayed as older than Holmes. The character was played by Andrei Panin, in his last role, as he died shortly after the filming was finished.
In the 2014 Japanese puppetry series Sherlock Holmes, John H. Watson, a doctor's son and transfer student from Australia, becomes the roommate of Sherlock Holmes in 221B of Baker House. Though initially at a loss as to how to deal with Holmes, he becomes close to his strange roommate. He records Holmes' investigation in a notebook known as "Watoson memo",[19] ("Memo of John H. Watson") and writes articles based on it for the school's wall newspaper. Wataru Takagi voices him and narrates the show.
In the 2018 Japanese drama series Miss Sherlock both lead characters are re-imagined as female. Dr. Wato Tachibana (Shihori Kanjiya) meets Sara “Sherlock” Futaba (Yuko Takeuchi) after becoming the witness of her mentor’s death. Soon she assists her in this event’s investigation and becomes her flatmate, friend and assistant. Sherlock calls her “Wato-san”, which sounds similar to “Watson”.
Prose and radioEdit
Stephen King, the American novelist, wrote a short story called "The Doctor's Case" in the collection Nightmares & Dreamscapes, where Watson actually solves the case instead of Holmes.
Nigel Bruce reprised his film role of Watson on the radio opposite first Basil Rathbone, then Tom Conway as Holmes in the 1940s.
Carleton Hobbs portrayed Holmes in a series of BBC radio broadcasts that ran from 1952 to 1969, with Norman Shelley playing Watson. Many of these were broadcast on Children's Hour. Of the many actors who have portrayed Holmes and Watson for the BBC, the Hobbs and Shelley duo is the longest running.
In 1954, Sir Ralph Richardson played Watson in a short radio series on NBC opposite Sir John Gielgud as Holmes.
Watson was also portrayed by English-born actor Michael Williams for the BBC Radio adaptation of the complete run of the Holmes canon from November 1989 to July 1998. Williams, together with Clive Merrison, who played Holmes, are the only actors who have portrayed the Conan Doyle characters in all the short stories and novels of the canon.[citation needed] After Williams' death, the BBC continued the shows with The Further Adventures of Sherlock Holmes. Four series were produced, all written by Bert Coules who had been the head writer on the complete canon project, with Andrew Sachs starring opposite Merrison.
In January 1998, Jim French Productions received the rights from the estate of Dame Jean Conan Doyle to produce new radio stories of Holmes and Watson. Lawrence Albert plays Watson to the Holmes of first John Gilbert and later John Patrick Lowrie.
In popular cultureEdit
See alsoEdit
1. ^ Also known as a Jazail, Jazair, or Janjal, a Jezail was a very large flintlock or matchlock musket, with a barrel up to 8 feet (2 m) long. They often fired a .50 or .75 inch calibre bullet weighing up to 2 ounces (57 g).see Butalia (1998), p.52. They were accurate at long range and often used as a sniper's weapon in warfare. Watson's wound was contradictorily located in his leg and his shoulder, depending on the story.
2. ^ A daily pension of 11 s 6 d is around £53 daily in 2018 money, when adjusted for inflation.[9] This a daily pension roughly equivalent to an agricultural labourer's weekly wage at the time, according to British Labour Statistics: Historical Abstracts, 1886–1968, Department of Employment and Productivity, 1981, cited in "Average Weekly Cash Wages paid to Ordinary Agricultural Labourers" at Relative Value of Sums of Money.
3. ^ Fifty guineas is around £5202 in 2018 money, when adjusted for inflation.[9] This was more than a year's wages for a servant or manual labourer at the time.
4. ^ Watson, rather than Holmes, guesses that the mysterious lodger printed their notes so as to conceal their handwriting, though initially neither one guesses precisely why they would want to.
1. ^ Allen Eyles (1986). Sherlock Holmes: A Centenary Celebration. Harper & Row. pp. 11–12. ISBN 0-06-015620-1.
2. ^ Alan Barnes (2002). Sherlock Holmes on Screen. Reynolds & Hearn Ltd. p. 10. ISBN 1-903111-04-8.
3. ^ Arthur Conan Doyle, "A Study in Scarlet", subtitle.
4. ^ The Problem of Thor Bridge Wikisource. Retrieved on 23 August 2011.
5. ^ Dorothy L. Sayers, "Dr Watson's Christian Name", in Unpopular Opinions (London: Victor Gollancz, 1946), 148–151.
6. ^ '"Home, James" - A Case of Domestic Identity', by David W. Merrell, in: The Baker Street Journal.
7. ^ Arthur Conan Doyle (1896). "The Field Bazaar". In Peter Haining (ed.), The Final Adventures of Sherlock Holmes. New York: Barnes & Noble Books, 1980; p. 81. ISBN 1-56619-831-3.
8. ^ a b c d A Study in Scarlet, Part 1, Chapter 1 Wikisource. Retrieved on 23 August 2011.
10. ^ A Study in Scarlet/Part 2/Chapter 7 Wikisource. Retrieved on 7 June 2013.
11. ^ Arthur Conan Doyle (1890). The Sign of the Four.
12. ^ A Study in Scarlet
13. ^ The Adventure of Charles Augustus Milverton
14. ^ Literary Qualities of The Hound of the Baskervilles | Novel Summaries Analysis. (26 January 2009). Retrieved on 23 August 2011.
15. ^ "Hero Complex - Los Angeles Times". Retrieved 2 November 2018.
16. ^ Kinsey, Wayne (2002). Hammer Films—The Bray Studios Years. Richmond: Reynolds & Hearn Ltd. p. 133. ISBN 1-903111-11-0.
17. ^ Willistein, Paul (19 November 1988), "It's Elementary, Comedy's Afoot In 'Without A Clue'", The Morning Call, Lehigh Valley
18. ^ Baring-Gould, William S. (1967). The Annotated Sherlock Holmes. Vol 2, pp. 527–528.
19. ^ The Japanese pronunciation of Watson is "Watoson".
20. ^ Mallory, Michael (2009). The Adventures of the Second Mrs. Watson. Dallas: Top Publications. ISBN 1-929976-57-7
21. ^ "Characters from DGS Episode 1". Retrieved 2 November 2018.
22. ^ "Character: Iris Watson". Retrieved 2 November 2018.
• Butalia, Romesh C. (1998). The Evolution of the Artillery in India: From the Battle of Plassey (1757) to the Revolt of 1857. Allied Publishers. ISBN 8170238722.
External linksEdit |
global_01_local_0_shard_00002368_processed.jsonl/46504 | Joseph Kasa-Vubu
(Redirected from Joseph Kasavubu)
Joseph Kasa-Vubu, alternatively Joseph Kasavubu, (c. 1915 – 24 March 1969) was a Congolese politician who served as the first President of the Democratic Republic of the Congo (then Republic of the Congo) from 1960 until 1965.
Joseph Kasa-Vubu
Joseph Kasa-Vubu at the Belgo-Congolese Round Table Conference.jpg
Joseph Kasa-Vubu at the Belgo-Congolese Round Table Conference, January 1960
1st President of the Republic of the Congo
In office
27 June 1960 – 24 November 1965
Prime MinisterPatrice Lumumba
Joseph Iléo
Justin Marie Bomboko
Joseph Iléo
Cyrille Adoula
Moise Tshombe
Évariste Kimba
Preceded byPosition established
Succeeded byMobutu Sese Seko
Personal details
Bornc. 1917
Kuma-Dizi, Mayombe, Belgian Congo
Died24 March 1969 (aged approx. 51–53)
Boma, Democratic Republic of the Congo
Political partyABAKO
Spouse(s)Hortense Ngoma Masunda (m. 1941)
ChildrenAdolphe Kasa-Vubu, Marie-Rose Kasa-Vubu, Flavien Kasa-Vubu, Justine Kasa-Vubu, Bibiane Kasa-Vubu, Zecké Kasa-Vubu, Joséphine Kasa-Vubu, Alain Kasa-Vubu and Michel Kasa-Vubu
Early lifeEdit
Joseph Kasa-Vubu was born in the village of Kuma-Dizi in the Mayombe district of the Belgian Congo. Different sources list his year of birth as 1910, 1913, 1915, or 1917, though 1915 is the most probable date. He was the eighth of nine children in a family of the Yomba ethnic group, a subset of the Kongo people. His father was a successful farmer who, as an independent entrepreneur, traded with street merchants in Cabinda and built his house at the outskirts of the village. This earned him the animosity of the villagers and in an attempt to assuage their hostility he volunteered to undergo a "poison test" with a substance extracted from a kasa tree.[a] The word "Kasa" was appended onto his name in commemoration of the event.[3] Kasa-Vubu's mother died four years after his birth, and his father died in 1936. On 31 January 1925 he was baptised under the Christian name of Joseph at the Scheutist Catholic mission of Kizu, near Tshela.[4]
In 1927 Kasa-Vubu enrolled in primary school at the third-year level. The following year he transferred to a minor seminary in Mbata-Kiela, 50 kilometers away from Tshela. There he completed his primary studies and began learning Latin and humanities in preparation for instruction at major seminary. An industrious student, Kasa-Vubu graduated second in his class in 1936 and was admitted to the Kabwe seminary in Kasai Province. He intended to study three years of philosophy and five years of theology before becoming an ordained priest. Following the completion of the former courses in 1939 he was expelled by the bishop.[4][b]
Kasa-Vubu subsequently returned to Mayombe and took up work as a bookkeeper for the Kangu mission. Dissatisfied with his salary of 80 francs per month, Kasa-Vubu passed the instructor's exam and became a sixth-grade teacher at the mission school in early 1941. However, his pay was not increased and he left the mission in open disagreement with the superior and the local bishop. In May he found a new job at Agrifor, an agricultural and logging company. With a monthly pay of 500 francs, he felt financially secure enough to marry; on 10 October Kasa-Vubu wedded Hortense Ngoma Masunda in a Catholic ceremony at the Kangu mission. They had nine children.[4]
In June 1942 Kasa-Vubu earned a job as a clerk in the finance department of the Belgian colonial administration in Léopoldville, the capital of the Congo. He worked there for 15 years,[4] attaining the rank of chief clerk, the highest level of employment available to Congolese civil servants under Belgian rule.[5] In 1956 he was in charge of accounting for all of the administration's general stores.[6]
Political activitiesEdit
Kasa-Vubu began semi-clandestine political organising work while he was still employed by colonial authorities.[7]
Following the resignation of its leader on 21 March 1954, Kasa-Vubu was elected president of the Alliance des Bakongo (ABAKO).[8] Under his leadership, the group swept the first open municipal Leopoldville elections in 1957 and he was elected mayor of the Dendale district of the city.[5]
Kasa-Vubu quickly became known as one of the first Congolese leaders to call for independence. At first, he advocated for independence from Belgium on a 30-year timeline, but he shortened the timetable as the ABAKO movement gained in strength.[7] In his inauguration speech as mayor of Dendale, Kasa-Vubu reiterated his demand for independence, drawing a reprimand from Belgian colonial authorities, which only strengthened his image as a Congolese leader.[5]
On 4 January 1959, an ABAKO political gathering organised by Kasa-Vubu erupted into violence, sparking the Léopoldville riots, a pivotal moment in the Congolese struggle for independence. Kasa-Vubu was set to address the crowd on African nationalism, but colonial authorities banned the meeting. They were unable to calm the crowd and thousands of Congolese began rioting. Kasa-Vubu was arrested, along with several other leaders, and imprisoned for inciting the riot. He was released two months later.[5]
Kasa-Vubu with the outgoing Governor-General of the Congo, Hendrik Cornelis, before the latter's departure from the country, July 1960.
Upon Congo's independence from Belgium, the ABAKO won a significant number of votes in the new parliament but not an outright victory. In a political compromise, it was agreed that Patrice Lumumba, of the Mouvement National Congolais (MNC) would be prime minister, and Kasa-Vubu would face Jean Bolikango, a former mentor in the ABAKO, for the presidency.[9] The election of Kasa-Vubu brought about wide-ranging acceptance of the Congo's new administration. The Belgian press reacted positively to the development, while the Léopoldville's daily newspaper Courrier d'Afrique, edited by a Kongo, showed much warmer approval of the government. International opinion expressed satisfaction at the striking of a proper balance in leadership.[10] Belgian politicians hoped that Kasa-Vubu would check Lumumba's impulses and personal disdain for Belgium.[11] He was officially sworn in as President on 27 June.[12]
The new republic was immediately disrupted by political and military strife and regional secessionist movements, and the central government was paralyzed by conflict between the more conservative Kasa-Vubu and leftist Prime Minister Lumumba. While Lumumba advocated for a stronger central government, Kasa-Vubu preferred a more decentralised form of government that gave autonomous powers to provinces under a federal system.[7]
Kasa-Vubu was regarded as rather mysterious in his motivations and his actions, frequently preferring to stay silent or give ambiguous answers when he was confronted. His role as head-of-state was theoretically ceremonial and far less influential than Lumumba's role as prime minister. During the immediate upheaval following independence, Kasa-Vubu took few steps and made few definitive statements, even as Lumumba appealed for international assistance to the Americans, the United Nations and the Soviet Union.[7] Meanwhile, Kasa-Vubu faced criticism from ABAKO and President Fulbert Youlou of Congo-Brazzaville for not curbing Lumumba's authoritarian actions. He resisted their pressure, and on 13 August he broadcast an appeal for unity and support for the government. Nevertheless, he cautioned the government against arbitrariness and excess:[13]
If I am under a moral obligation to support and defend the government within the limits set by the law, the members of the government themselves have a duty to work together as a team. Their policy must be the policy of the government and not that of one party, one race, or one tribe. It must be a policy which reflects the interests of the nation and which allows humanitarian values to flourish in freedom. This imperative excludes all feelings of hatred, suspicion, and bad faith towards those who have collaborated loyally with us. It is also the duty of the government to respect the institutions which have been set up and to abide by the normal rules of democratic practice.
Kasa-Vubu with Colonel Joseph-Désiré Mobutu in 1961
On 5 September, Kasa-Vubu dismissed Lumumba, who was accused of communism. Lumumba refused to accept that but announced Kasa-Vubu's dismissal,[14] creating a stalemate that endured until 14 September, when Army Commander Joseph-Désiré Mobutu seized power and arrested Lumumba. Lumumba was later handed to Moise Tshombe's secessionist forces in the southern province of Katanga and killed.
Over the next five years, Kasa-Vubu presided over a succession of weak governments. In July 1964, he appointed Tshombe as prime minister, with a mandate to end the Simba Rebellion. Tshombe recalled the exiled Katangese gendarmerie and recruited white mercenaries, integrating them with the Armée Nationale Congolaise (ANC). Many of the mercenaries had fought for Katanga while Tshombe was the leader of that breakaway province. Despite the successes against the Simba rebels, Tshombe's prestige was damaged by his use of white mercenaries and western forces. He lost the support of Kasa-Vubu, who dismissed him from the post of prime minister, in October 1965.
Mobutu seized power for a second time on 25 November 1965, now deposing Kasa-Vubu and subsequently declaring himself head of state.
Mobutu placed Kasa-Vubu under house arrest[15] before eventually allowing the deposed president to retire to his farm in Mayombe. Kasa-Vubu died in a hospital in Boma four years later in 1969, possibly after a long illness.[5]
Following his death, Kasa-Vubu's family went into exile, first to Algeria and then Switzerland.[9] One of his daughters, Justine M'Poyo Kasa-Vubu, eventually returned to the Congo (then called Zaire) in the 1990s. In 1997, she was appointed a cabinet minister by Laurent Kabila and then ambassador to Belgium.[16]
Kasa-Vubu's role in Congolese history has been overshadowed in literature by Lumumba and Mobutu.[17] Anthropologist Yolanda Covington-Ward wrote that, contrary to Lumumba's "privileged" position in historiography on Congolese nationalism, Kasa-Vubu and ABAKO were the primary "driving force" behind the independence movement.[18]
In popular cultureEdit
1. ^ The poison from a kasa tree was used to determine whether or not a person was a witch.[1] According to biographer Charles-André Gilis, the test occurred on the day of Kasa-Vubu's birth.[2]
2. ^ No official reasoning was ever given for Kasa-Vubu's expulsion, though Gilis and Kasa-Vubu's daughter, Justine, attribute this to his alleged commitment to an academic pursuit of justice that ran afoul of his teachers' ideals.[4]
1. ^ Morris 2006, p. 157.
2. ^ Biographie belge d'outre-mer 2015, p. 218.
3. ^ Biographie belge d'outre-mer 2015, pp. 217–218.
4. ^ a b c d e Biographie belge d'outre-mer 2015, p. 219.
5. ^ a b c d e Reuters 1969.
6. ^ Biographie belge d'outre-mer 2015, p. 220.
7. ^ a b c d Tanner 1961.
8. ^ Covington-Ward 2012, p. 75.
9. ^ a b Kisangani 2009, p. 265.
10. ^ Hoskyns 1965, p. 79.
11. ^ Hoskyns 1965, p. 83.
12. ^ Bonyeka 1992, pp. 248–249.
13. ^ Hoskyns 1965, p. 198.
14. ^ Doyle 2006, p. 175.
15. ^ Rich 2012, p. 304.
16. ^ Kisangani 2009.
17. ^ Loffman, Reuben (22 June 2017). "From Mobutu to Kabila, the DRC is paying a heavy price for autocrats at its helm". The Conversation. Retrieved 18 January 2018.
18. ^ Covington-Ward 2012, p. 73.
19. ^ "Les discours du 30 juin 1960: Roi Baudouin , Pdt Joseph Kasavubu et le 1er Min. Patrice Emery Lumumba | Radio Tele LAVDCONGO".
Further readingEdit
• Kasa-Vubu, Justine M'Poyo (1997). Kasa-Vubu et le Congo indépendant: 1960–1969. Brussels: Le Cri édition. ISBN 9782871061854.
• Kasa-Vubu, Justine M'Poyo (1985). Joseph Kasa-Vubu, mon père: de la naissance d'une conscience nationale à l'indépendance. Brussels: Éditions de Chabassol. OCLC 17233037.
Preceded by
Position created on independence from Belgium
President of the Republic of the Congo
Succeeded by
Mobutu Sese Seko |
global_01_local_0_shard_00002368_processed.jsonl/46506 | Khayr al-Nisa Begum
Khayr al-Nisa Begum (Persian: خیرالنساء بیگم; known under the royal title Mahd-i Ulya (مهد علیا), "the highest-ranked cradle") (died 26 July 1579) was an Iranian Mazandarani princess from the Marashi dynasty, who was the wife of the Safavid shah (king) Mohammed Khodabanda (r. 1578–1587) and mother of Abbas I. During the early part of her husband's reign she was a powerful political figure in her own right and governed Iran de facto between February 1578 and July 1579.[1]
She was the daughter of Mir Abdollah Khan II, the Marashi ruler of the province of Mazandaran, who claimed descent from the fourth Shi'a Imam Zayn al-Abidin.[2] Members of the family had ruled Mazandaran since the mid-14th century. In 1565-6 Mahd-i Ulya fled to the Safavid court after her cousin Mir Sultan-Murad Khan killed her father. Here she was married to Shah Tahmasp I's son Mohammed Khodabanda. Desire for revenge on her father's killer would remain with her for the rest of her life.[3]
In 1578, on the death of his brother Ismail II, Mohammed Khodabanda became Shah of Iran. Mohammed was a weak-willed ruler and the leading woman at the court, his sister Pari Khan Khanum (who had allied with the powerful Qizilbash army factions) believed she could easily control him. From the day Mohammad Khobanda was appointed king, Mahd-i Ulya, took control of his affairs. She was knowledgeable of her husband's deficiency and to atone for his lack of uprightness and quality she resolved to try to become the practical ruler of the Safavid state.[4]
Mohammad Khodabanda and Mahd-i Ulya entered the environs of Qazvin on 12 February 1578. This brought an end to the indisputable rule that Pari Khan Khanum had enjoyed for two months and twenty days. Although she was still the effective ruler of the state, she would now meet opposition from Mahd-i Ulya and her allies. When they reached the city, Pari Khan Khanum showed up to gladly receive them with great grandeur and parade, sitting in a golden-spun litter, whilst being guarded by 4,000-5,000 private guards, inner-harem personal assistants and court attendants.[4]
Mahd-i Ulya was continually informed by the welcoming social gatherings in Qazvin about the large amount of influence and power that Pari Khan Khanum held, thus ratifying what she had already been told by Mirza Salman Jaberi, the former vizier of Ismail II. She then realized that as long as Pari Khan Khanum was alive, she would not be able to control the affairs of the Safavid state and become the de facto ruler of the country. She thus began planning to have her killed.[4]
The order was carried out in 12 February 1578, when Khalil Khan Afshar, who had served as Pari Khan Khanum's tutor during the reign of Tahmasp, had her strangled to death.[4] Pari Khan Khanum's powerful uncle, Shamkhal Sultan, was executed shortly after, whilst Ismail II's infant son Shoja al-Din Mohammad Safavi was murdered.[5]
Mahd-i Ulya now assumed effective control of Iran. She was kept informed of all political developments in the country and built up her own network of support by appointing friends and relatives to important posts. She favoured the "Tajiks" (Persians) instead of the Qizilbash. Her chief aims were promoting the career of her elder son Hamza Mirza (at the expense of his brother Abbas) and seeking revenge for her father. Since his killer, Sultan-Murad Khan, had already died, she turned her attention to his son Mirza Khan. Qizilbash leaders had given Mirza Khan a promise of safe-conduct but as he was travelling to the capital Qazvin the queen's supporters seized and killed him.[6][7]
Angered by the queen's actions, the Qizilbash sent a petition to the shah asking him to remove her from power or face revolts. The shah considered sending her into exile but Mahd-i Ulya refused to concede to their demands. Finally, a group of Qizilbash conspirators accused the queen of having a love affair with Adil Giray, brother of the Crimean Tatar Khan, who was being held captive at the Safavid court. They burst into the harem and strangled her and her mother on 26 July 1579.[8][9]
See alsoEdit
1. ^ Women in Iran p.146,158
2. ^ Savory p.71
3. ^ Women in Iran p.158
4. ^ a b c d Parsadust 2009.
5. ^ Savory 2007, p. 71.
6. ^ Women in Iran p.159
7. ^ Savory p.71
8. ^ Savory pp.71-73
9. ^ Cambridge History of Iran p.254
• Nashat, Guity; Beck, Lois (2003). Women in Iran from the Rise of Islam to 1800. University of Illinois Press. pp. 1–253. ISBN 978-0-252-07121-8.
• Parsadust, Manuchehr (2009). "PARIḴĀN ḴĀNOM". Encyclopaedia Iranica. |
global_01_local_0_shard_00002368_processed.jsonl/46507 | Sharlston is a village and civil parish situated 4 miles (6.4 km) east of Wakefield in West Yorkshire, England, and includes the settlements of Old Sharlston, Sharlston Common and New Sharlston. Its population at the 2001 census was 2,756,[1] reducing to 2,663 at the 2011 Census.[2] The village lies in the City of Wakefield unitary district.
Sharlston - Winding Wheel.jpg
Sharlston winding wheel
Sharlston is located in West Yorkshire
Location within West Yorkshire
Population2,663 (2011)
OS grid referenceSE3884919437
Civil parish
• Sharlston
Metropolitan borough
Metropolitan county
Sovereign stateUnited Kingdom
Postcode districtWF4
Dialling code01924256
PoliceWest Yorkshire
FireWest Yorkshire
EU ParliamentYorkshire and the Humber
UK Parliament
List of places
53°40′12″N 1°24′48″W / 53.669968°N 1.41346°W / 53.669968; -1.41346Coordinates: 53°40′12″N 1°24′48″W / 53.669968°N 1.41346°W / 53.669968; -1.41346
The village of Old Sharlston has existed for over five hundred years, with the oldest known record indicating that Sharlston Old Hall was built in 1574. In the early 18th century, the village was acquired by the Earl of Westmorland.
Sharlston's listed buildings and structures are grouped around Grade II* Sharlston Hall,[3][4] a manor house of 15th century origin with later additions, and include the hall's entrance gateway.[5][6]
Until April 1929 Sharlston formed part of the Warmfield parish, but is now managed by its own parish council.[7]
Pit villageEdit
A pit or model village of more than 150 back-to-back houses was built at New Sharlston from 1864 to house Sharlston Colliery Company workers. The houses cost just over £100 each and the streets were named Long Row, Crossley Street and High Street. A Methodist chapel and a day school were built on Crossley Street. The properties became the property of the National Coal Board in 1947. In 1961 twenty eight back-to-back houses were converted into 14 through houses. The school and the chapel have been demolished.[8]
New Sharlston has witnessed rapid decline since the 1984-85 miners' strike which hit Sharlston and its surrounding villages hard.
White Horse pub at Sharlston.
In 2011 the village old people's home was demolished and replaced with new builds for rent and sale. A village public house, The Sharlston,[9] has closed, the building being converted to a pharmacy.
The village has an amateur rugby league team, Sharlston Rovers, which recently won the Wakefield Division 2 Cup. There is also a juniors team, the teams in 2017 are under 11s,under 9s,under 8s,under 7s,under 6s,under 5s and tots.
1. ^ Office for National Statistics : Census 2001 : Parish Headcounts : Wakefield Archived 2011-06-13 at the Wayback Machine. Retrieved 11 September 2009
2. ^ "Civil Parish population 2011". Neighbourhood Statistics. Office for National Statistics. Retrieved 2 March 2016.
3. ^ Historic England. "Sharlston Hall (1253750)". National Heritage List for England. Retrieved 10 January 2012.
4. ^ Giles, Colum (1986); Rural Houses of West Yorkshire, 1400-1830, p. 212; Stationery Office Books. ISBN 0-11-701194-0
5. ^ Historic England. "Entrance Gateway to Sharlston Hall (1261623)". National Heritage List for England. Retrieved 10 January 2012.
6. ^ "Entrance to Sharlston Hall", Retrieved 10 January 2012
7. ^ Sharlston Parish Council Archived 2011-05-21 at the Wayback Machine. Retrieved 10 January 2012
8. ^ Sharlston Colliery Model Village, Heritage Gateway, retrieved 13 August 2015
9. ^ "Sharlston Village, Sharlston Public House", Retrieved 10 January 2012
External linksEdit
Media related to Sharlston at Wikimedia Commons |
global_01_local_0_shard_00002368_processed.jsonl/46508 | Wikimedia disambiguation page
Jaws may refer to any of the following films that are about great white sharks that attack people. The original film was based on the novel by Peter Benchley.
|
global_01_local_0_shard_00002368_processed.jsonl/46512 | Beacon Rock State Park
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Beacon Rock State Park
Beacon rock.jpg
Beacon Rock viewed from the west
Map showing the location of Beacon Rock State Park
Map showing the location of Beacon Rock State Park
Location in state of Washington
LocationSkamania County, Washington, United States
Nearest cityWashougal, Washington
Coordinates45°39′42″N 122°00′56″W / 45.66167°N 122.01556°W / 45.66167; -122.01556Coordinates: 45°39′42″N 122°00′56″W / 45.66167°N 122.01556°W / 45.66167; -122.01556[1]
Area4,464 acres (18.07 km2)
Elevation848 ft (258 m)[1]
DesignationWashington state park
AdministratorWashington State Parks and Recreation Commission
WebsiteBeacon Rock State Park
Beacon Rock State Park is a geologic preserve and public recreation area on Route 14 in the Columbia River Gorge National Scenic Area in Skamania County, Washington, United States. The park takes its name from Beacon Rock, an 848-foot (258 m) basalt volcanic plug on the north shore of the Columbia River 32 miles (51 km) east of Vancouver. On October 31, 1805, the Lewis and Clark Expedition arrived here and first measured tides on the river, indicating that they were nearing the ocean.[2]
Beacon Rock[edit]
"Castle Rock" in a lithograph from Frances Fuller Victor's Eleven years in the Rocky Mountains and a life on the frontier (1877).
Beacon Rock is an 848-foot-tall (258 m) monolith composed of basalt on the north bank of the Columbia River. It was named by Lewis and Clark in 1805; they originally referred to it as Beaten Rock, later as Beacon Rock. They noted that the rock marked the eastern extent of the tidal influence in the Columbia. The rock was later known as Castle Rock, until 1915 when its name was changed back to Beacon Rock.[3][4]
Henry J. Biddle purchased the rock in 1915 for $1 and during the next three years constructed a trail with 51 switchbacks, handrails and bridges.[3] The three-quarter mile trail to the top, completed in April 1918, leads to views in all directions.
The United States Army Corps of Engineers planned to destroy the rock to supply material for the jetty at the mouth of the Columbia (see Columbia River Bar), and dug three caves on the rock's south side. During this time, Biddle's family tried to make it a state park. At first Washington refused the gift, but changed its position when Oregon offered to accept. The park was established in 1935. Workers with the Civilian Conservation Corps made improvements which remain in use.
Railings of the switchback trail ascending Beacon Rock
Another view of the interlocking walkways
Beacon Rock has been variously claimed to be the second largest free standing monolith in the northern hemisphere, or in the world, just behind the Rock of Gibraltar, Stone Mountain, or Mount Augustus, the latter two being very much larger than either of the first two. The assertion depends on how one defines the term "monolith." For example, Devils Tower National Monument in Wyoming is larger than Beacon Rock, but is considered an igneous intrusion rather than necessarily a "single rock."
Activities and amenities[edit]
Beacon Rock is known for quality, challenging, technical rock climbing. The park's 4,464 acres (1,807 ha) include 9,500 feet (2,900 m) of Columbia River shoreline and forested uplands with 20 miles (32 km) of hiking, mountain biking, and equestrian trails. The park has boating and camping facilities.[2] Trails go to the top of Beacon Rock and Little Beacon Rock. Hardy Falls and Rodney Falls (Pool of the Winds) are scenic highlights along the trail to the summit of 2,445-foot (745 m) Hamilton Mountain,[5] which has a view of Bonneville Dam and points east. Hamilton Mountain Saddle, located north of the summit, provides additional views, including Table Mountain, and the opportunity for a 7.75 miles (12.47 km) loop hike.[6]
• Mueller, Marge (2004). Washington State Parks: A Complete Recreation Guide (Third ed.). Seattle: The Mountaineers Books. p. 177. ISBN 0-89886-893-9.CS1 maint: uses authors parameter (link)
1. ^ a b "Beacon Rock State Park". Geographic Names Information System. United States Geological Survey.
2. ^ a b "Beacon Rock State Park". Washington State Parks and Recreation Commission. Retrieved February 14, 2016.
3. ^ a b "Henry J. Biddle photographs, c.1860s-1925". Historic Photograph Collections. University of Oregon. Retrieved January 5, 2015.
4. ^ GNIS says its decision to rename was in 1915: "GNIS entry detail for Beacon Rock". September 10, 1979. Retrieved September 9, 2006.
5. ^ "Hamilton Mountain". Geographic Names Information System. United States Geological Survey.
6. ^ "Hamilton Mountain Loop in Beacon Rock State Park". Hikespeak. Retrieved December 18, 2018.
External links[edit] |
global_01_local_0_shard_00002368_processed.jsonl/46536 | Not one of us can live twice
On August 6, 1945, at 8.15am, an atom bomb was dropped on the city of Hiroshima, in Japan.
Today, in memory of those who were lost and for those who lived with the aftermath, as well as all of those caught in war, I would like to post an etegami the features a line from a Japanese poet, Toki Zenmaru, writing in 1940 of war reports in China, long before the United States was involved, evoking the pain and tragedy of war.
The full poem in English is:
“Abandoned corpses numbered
in the hundreds,” they say,
Not one of us
can live twice.
|
global_01_local_0_shard_00002368_processed.jsonl/46566 | The Fall Girl – Prelude
Quentin Tarantino is a genius in my opinion. If Kill Bill does not properly demonstrate his creative dexterity, I don’t know what does. (Though I am wondering how Django Unchained will turn out; damn right I’m gonna see it!) The allure of Kill Bill, in my opinion, lies in the tale of Beatrix Kiddo, the Bride. That first image of her lying on the ground, panting and bloody, coupled with the polarity of her at the end, still panting and bloody but stronger now, piques the mind of a girl like me. I can only wish to create a character as compelling as the one Uma Thurman brought to life.
Kill Bill entered my life in 2003 when I was a freshman in college and dating a man who was nearly a decade older than I was. He was my first in everything. I was young. I loved him.
So you can guess I was pissed when I found out he was cheating on me. Bastard! oh well.
So I did what any nerd girl writer who has been jilted would do. I wrote a story about it. Fictional but inspired by actual events. Like to hear it? Hear it go!
The pain she felt was like oppression. It tied down her every muscle, every tendon, and it felt like a thousand agonies when she turned and lifted her head to look at her assailant. The smug look in his brown eyes—brown eyes could at one time stare into endlessly and thought were beautiful—burned some of that pain away as adrenaline made its healing track through her veins.
She was down right now, being held down by one of her assailant’s henchmen, but she wasn’t going to stay down. It wasn’t her way.
It had been a strange set of events that had landed her at this moment. One night, she’d stumbled upon the indiscretions this same man standing over her with a gun in his only hand. He had been cheating on her for several months, and when she had tried to show her disapproval in a more physical manner (by kicking his ass), his bodyguards had surfaced to remove her from scene. In the attempt to shake her down, they were accosted by two guys and a curly-haired brunette who kicked their beefy, overpaid and pampered asses. For their good deed, she found herself repaying the deed by becoming a domestic in the infamous Munsey House. Before she had realized what she was doing, she had ended up inadvertently making friends with some of her deceitful ex-boyfriend’s mortal enemies. Not to mention living in the spacious mansion of one.
It was a small world, after all.
But her experiences there were not without their lessons. Karate lessons, to be precise. By day, she picked up after a man she hardly saw in the light of day without incident and his baby sister, who had become her best friend. And by night, she strengthened her body and mind with martial arts. It didn’t take long before the idea of revenge blossomed in her head. (Too bad she hadn’t read the disclaimer about the consequences. Would have helped, wouldn’t it?)
“So you thought that you were going to drop in here like some kind of fucking superhero and beat me didn’t you?” he asked, his voice echoing throughout the high-ceilinged room. Her nostrils flared out of anger, but she didn’t answer. She didn’t feel like dignifying that with an answer—which was enough for him. He cackled and stepped around her. He’s really getting off on this beating me down and shit, she mused. She glared at his pricey leather loafers spotted with blood and tried not to think about whose blood that was. Fucker.
As if he could read her ill thoughts about him, he placed his foot deliberately on her flattened hand. She heard the crush and crackle of her own bones and thought of something else to avenge.
“Leave her alone!” cried the girl tied up in the chair behind him. The reason why she was here. She tried not to look at the blonde because the bruises and cuts on her beautiful face would have angered her past any rational thought. And she had to keep her head in the game as much as she could. “You’ve hurt her enough.”
As if the young blonde with the large blue eyes in bondage were a mere fly skimming across his coveted morning cup of Maxwell House coffee, he flicked a hand at one of his associates. Her indignant cries were soon silenced with duct tape. Anger burned in her belly at the sound of the blonde struggling against the rope and tape. She added that to the list of things he would surely pay for.
Once that little irritation was taken care of, he looked down at her and continued speaking in that same impudent tone.
“I must say, I didn’t think you were capable of even getting in here,” he admitted as he paced around her body. “You were never known for your fighting skills. Always were a scaredy cat.” He tapped his chin pensively with the tip of the gun barrel. “I guess you’ve changed it up a little. But not enough to beat me, baby.”
Goddamn. He called her baby. He had some nerve. But that was the kind of smart-ass thing he was famous for. “You forgot,” she said in a deep, husky voice that shocked herself and dimly made her think of Uma Thurman in Kill Bill, “we fought before and it didn’t have such a favorable outcome for you.” She mustered up some buried defiance and smugness of her own. “You’re still missing a hand, aren’t you?”
Above her head somewhere, she heard someone snicker in the silence that had fallen. Her lips curved at that sound. She heard his yells for quiet and the sound of a fist making contact on flesh. Rapid footsteps echoed around her then she felt the toe of his shoe in her ribs. She gritted her teeth against the pain as it assaulted her body again. Instead of focusing on the pain, she fixated on the triumph of it. She’d wounded him without lifting a finger and he’d lashed out at her because of it. Sticks and stones her newly toned ass.
“Shut up!” he yelled at her tense, prostrate form. “You shut up before I kick you again.”
“The truth hurts, doesn’t it?” she inquired, listening to his heavy breaths as she rode on her triumph. Prudence told her to stay quiet and bide her time until the others made it there, but her mouth ran on despite itself. Come on cavalry! Anytime now… “I may be down on the ground here about to die but you’ll live on with the knowledge that I amputated you. I made you a cripple with a mere flick of my wrist. I cut off your calculating, cheating, fornicating right hand—and it felt so fucking good.”
“It’s not going to feel good when I kill you, you can be sure of that,” he spat at her. “That motherfucker Mark Munsey is going to regret the day he sent you after me, bitch.”
“Mark has nothing to do with this,” she said firmly. “So putting him into the middle is not going to justify what you’re doing.”
He chuckled sardonically at her statement. “Oh don’t even go there. You’re a tool to him, just as much as the women he plays with on a daily basis.” At that, the blonde tried to refute the claims about her big brother, but they only came out as a string of intelligible, muffled words. A nudge with a semiautomatic had her going quiet. “He used you to get back at me because you are too easily manipulated to think for yourself. You were a tool that fell right into his hands. You mean shit to him.”
Even though she knew intellectually that he only spoke those words to get under her skin, the possibility of the veracity in them burned her. She thought of the seemingly unflappable, sometimes aloof, and shrewd young man in question and found that she didn’t know what he was capable of. And that one fact almost loosened her grip on everything she’d built during the past several months. Hastily, she pushed it aside, knowing that it was best handled later when she got prove it herself. She would make sure that there was a later, somehow.
“Oh look,” he said, tone mocking. “It looks like I’ve shut her up.”
“Say what you want about him,” she found herself saying, “but at least he’s honorable enough not to make me promises he knows he can’t keep. As I recall, that was a bit of a problem with you.”
“Comparing me with that asshole is not going to wound me.”
She couldn’t help it. She had to say it. “Well, there’s that and then the fact that he’s still got both hands.”
In response to that little fleshy barb, he dug the toe of his shoe into her hurt ribs, flashing a feral smile as she tensed in her effort not to show her pain. He tilted his head thoughtfully. “I think we oughta send him a package for his efforts, don’t you think?” His brown orbs gleamed with malice and she could see the intent in them. “Every good deed should have its reward.”
“It’s the golden rule,” she murmured. “And so then you’ll get yours. Be sure of it.”
He shoved her onto her back so that she stared up into his face. The sudden movement had her taking a sharply indrawn breath. A part of her realized at that moment that her own death was imminent, but the rest of her didn’t care. Death did not scare her. The only thing that infuriated now was not Death—it would not be culpable. No—this bastard would be at fault for bringing her to Death.
“No,” he corrected her arrogantly. “You are gonna get yours.” He aimed the gun at her head and the blonde’s muffled screams of protest pierced the air. “You’re gonna die knowing I bested you. Fuck my right hand. I got the last laugh. Good night, bitch.” |
global_01_local_0_shard_00002368_processed.jsonl/46591 | Jump to content
Recommended Posts
Does anyone know how to use HWTK studio to develop guis? I can't get my head around the positioning of buttons and text boxes so was hoping the HWTK gui toolkit doesn't seem to have anything like that in it. When I click file, all it offers me is Exit.... which isn't exceptionally useful.
Share this post
Link to post
Share on other sites
Cheers Tinh,
Hope you are well.
Yea, mine doesn't seem to have any options. All I get is a demo panel which shows me the various widgets and the code (assigned to those buttons) but nowhere to position buttons or read in code.
Maybe there were more options I needed to click when installing the software and this is just a basic demo version?
Share this post
Link to post
Share on other sites
Ok, I see
In case you want to position widgets in both row & column, use grid command
if using pack, you need to pack label and entry in a sub frame, then pack subframes top side down
Or you can use place command - the most freely-positioning command
Share this post
Link to post
Share on other sites
Join the conversation
Reply to this topic...
× Pasted as rich text. Paste as plain text instead
Only 75 emoji are allowed.
× Your previous content has been restored. Clear editor
• Create New... |
global_01_local_0_shard_00002368_processed.jsonl/46596 | Welcome! Log In Create A New Profile
Unit 1.10.0 release
Valentin V. Bartenev
August 22, 2019 03:52PM
I'm glad to announce a new release of NGINX Unit.
This release includes a number of improvements in various language modules
and, finally, basic handling of incoming WebSocket connections, currently
only for Node.js. Next in line to obtain WebSocket support is the Java
module; it's almost ready but requires some polishing.
To handle WebSocket connections in your Node.js app via Unit, use the
server object from the 'unit-http' module instead of the default one:
var webSocketServer = require('unit-http/websocket').server;
Another interesting and long-awaited feature in this release is the splitting
of PATH_INFO in the PHP module. Now, Unit can properly handle requests like
/app.php/some/path?some=args, which are often used to implement "user-friendly"
URLs in PHP applications.
Changes with Unit 1.10.0 22 Aug 2019
*) Change: matching of cookies in routes made case sensitive.
*) Change: decreased log level of common errors when clients close
*) Change: removed the Perl module's "--include=" ./configure option.
*) Feature: built-in WebSocket server implementation for Node.js module.
*) Feature: splitting PATH_INFO from request URI in PHP module.
*) Feature: request routing by scheme (HTTP or HTTPS).
*) Feature: support for multipart requests body in Java module.
*) Feature: improved API compatibility with Node.js 11.10 or later.
*) Bugfix: reconfiguration failed if "listeners" or "applications"
objects were missing.
*) Bugfix: applying a large configuration might have failed.
Please welcome our new junior developer, Axel Duch. For this release, he
implemented scheme matching in request routing; now, he works to further extend
the request routing capabilities with source and destination address matching.
In parallel, Tiago Natel de Moura, who also joined the development recently,
has achieved significant progress in the effort to add various process
isolation features to Unit. You can follow his recent work on Linux
namespaces support in the following pull request:
- https://github.com/nginx/unit/pull/289
See also his email about the feature:
- https://mailman.nginx.org/pipermail/nginx/2019-August/058321.html
In the meantime, we are about to finish the first round of adding basic
support for serving static media assets and proxying in Unit.
Stay tuned!
wbr, Valentin V. Bartenev
nginx mailing list
Subject Author Posted
Unit 1.10.0 release
Valentin V. Bartenev August 22, 2019 03:52PM
Sorry, only registered users may post in this forum.
Click here to login
Online Users
Guests: 107
Record Number of Users: 6 on February 13, 2018
Record Number of Guests: 421 on December 02, 2018 |
global_01_local_0_shard_00002368_processed.jsonl/46605 | Results 1 to 2 of 2
1. #1
Senior Member
Join Date
Sep 2013
Log file setting to show only errors on Log
I need to check only errors in my log file. Now my log file creating errors, warning and all. I need to show only errors on my log file. Is there any way to set condition to store only errors on log file. I need to set this condition on my config file.
2. #2
Join Date
Jul 2006
For this matter Lightstreamer entirely delegates to logback and leans on its features.
Our suggestion it to set a filter on the appender that manages your log file, rather than reconfiguring all loggers, so that you can switch to a more verbose log easily when needed.
This means adding inside the appender definition the following:
<filter class="ch.qos.logback.classic.filter.ThresholdFilt er">
(if you copy that, please be aware that the formatting may introduce spurious spaces).
You can also see an example in the factory log configuration file.
At the beginning of the definition of the LSDailyRolling appender, you can see a filter commented out.
Similar Threads
1. Current delay in log file
By faa666 in forum General
Replies: 1
Last Post: February 15th, 2012, 09:54 AM
2. Log file error
By colmfield in forum Client APIs
Replies: 4
Last Post: September 21st, 2010, 12:11 PM
3. Sync errors in server log
By riwang in forum Client APIs
Replies: 29
Last Post: June 28th, 2010, 12:56 PM
4. How can I limit the log file size ?
By GoatHunter in forum General
Replies: 2
Last Post: August 25th, 2009, 11:54 AM
5. Replies: 5
Last Post: February 12th, 2008, 04:00 AM
Tags for this Thread
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts |
global_01_local_0_shard_00002368_processed.jsonl/46617 |
A Lemonade Stand Costs HOW Much, According to a Parenting Magazine?
Hi Folks — We all know that magazines exist to sell things, but this example seems particularly outrageous: A parenting magazine lists all the things your kids need to run a lemonade stand — from name brand ice cube trays to an actual, store-bought stand, to a juicer to squeeze the lemons (has no one heard of hands? Or lemonade mix?) — and the total is pushing $300. If you want the breakdown of all the costs, here it is! – L (and don’t diss me for vlogging! I am trying to embrace all sorts of new things!) |
global_01_local_0_shard_00002368_processed.jsonl/46618 | I've recently been studying the:
-Simple Future; and
-Conditional (mood)
in French, and I'm wondering why the tenses are constructed in the way that they are.
For the imperfect, one conjugates the verb as though it were a normal present-tense verb, but just uses different endings (-ais, -ait, -aions, etc.)
For the simple future, the verb stems are modified and always end with a least one "r" for the stem, then the conjugation for avoir is added (largely) to each form accordingly.
For the conditional, one takes the verb stem of the simple future and then adds the conjugations for the imperfect tense.
Why is there such a strange combination for the conditional and how did the other tenses come to be with their conjugations and stems and whatnot?
• "Strange" is in the eyes of the beholder :-) That being said, this is above my paygrade in linguistics. I hope one of the linguists here will give an answer. – Frank Feb 7 '17 at 2:22
• I'd never heard the future tense described as "verb stem + avoir" or the conditional as "verb stem + imperfect". These sound like somewhat weak mnemonics that don't have any relationship to etymology – qoba Feb 7 '17 at 5:17
• 2
@qoba It's not mnemonics and has a historical reason, and you can find that in most grammar books for French natives (eg Grammaire Larousse), or for learners as a foreign language. And it's most of the time pointed out to primary schoolchildren in France. – None Feb 7 '17 at 7:11
• Wow! Never knew that before – qoba Feb 7 '17 at 20:22
Conditional origin is already answered here: What is the historical origin of the French présent conditionnel?
Imperfect is a direct evolution of the same tense in Latin, with the noticeable fact an 's' has been added to the first person singular.
amabam → amava → ameie → aimoie → aimois → aimais
amabas → amavas → ameies → aimoies → aimois → aimais
amabat → amavat → ameiet → aimoiet → aimoit → aimait
amabamus → amiiens → aimions
amabatis → amiiez → aimiez
amabant → ameient → aimoient → aimaient
Reference: http://monsu.desiderio.free.fr/curiosites/imparfait.html
The simple future has been designed a similar manner than the conditional, from periphrasis:
amare habeo → amareo → aimerai
amare habeas → amareas → aimeras
amare habet → amarea → aimera
amare habemus → amaremus → aimerons
amare habetis → amareis → aimerez
amare habent → amarent → aimeront
As you see, its no surprise if you recognize the avoir verb in the future tense endings as that very verb was already used in Latin.
Reference: http://monsu.desiderio.free.fr/curiosites/futur.html
• Amare habeo? Not amabo pour le futur? C'est du Bas Latin? – Frank Feb 7 '17 at 15:34
• 1
@Frank Les futurs en -b- ont disparu de toutes les langues romanes, en faveur de constructions initialement périphrastiques, généralement le participe + habere. Ces formes sont déjà présentes ça et là durant la période classique, mais ne deviennent dominantes que dans les langues romanes, donc j'hésiterais à appeler ça du bas latin. Amābo aurait donné j'amèf en français (en supposant une évolution phonétique normale sans reformation sur base du reste du paradygme verbal, en tout cas, ce qui est hautement improbable). – Eau qui dort Feb 7 '17 at 17:29
• The resources I have found suggest that the "ei" of the imperfect in Old French 1st-conjugation verbs was not a natural development from Latin "ab", but came about by analogy with the "eb" of 2nd and 3rd conjugation verbs: books.google.com/… – sumelic Feb 7 '17 at 18:19
• books.google.com/… – sumelic Feb 7 '17 at 18:19
• @sumelic i was about to mention that in my preceding comment, but jlliagre's first link makes a note of it. It's probably worth an aside, or to take a regular third group verb as example rather than aimer – Eau qui dort Feb 7 '17 at 19:59
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/46625 | #MyTwistedHead One – Pinocchio
#MyTwistedMind is a series in which I feature an alternative ending to classic and/or popular stories/movies/books. These are very short posts as you may notice while reading them, and I shall be taking requests to any stories you want me to change.
Geppetto was swallowed whole by the whale. Pinocchio never knew what happened to his father. He lived a lonely life, blaming himself for Geppetto’s demise. The fox and the cat found the very sad Pinocchio dying of hunger just outside of the circus, and they burned him to cook donkeys for dinner.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/46647 | Cooking oil as an additive component of candle essay
Investigatory project format research papers Investigatory project parts SlideShare example essay paper garbo resume is my passionexample essay paper.
Cooking oil as an additive component of candle essay
The Jews are the best we've got so killing them is killing us. I have always liked the story of Gideon See Judges chapters 6 to 8 and it is surely no surprise that in the present age Israel is the Gideon of nations: Few in numbers but big in power and impact.
Postings from Brisbane, Australia by John J. America is no longer the land of the free. It is now the land of the regulated -- though it is not alone in that, of course The Leftist motto: It's just people I can't stand" Why are Leftists always talking about hate?
Sadly, there are many people in both societies in whom hatred for others is so strong that they are incapable of respect for the individual. The destructiveness of what they support causes them to call themselves many names in different times and places but they are the backbone of the political Left The large number of rich Leftists suggests that, for them, envy is secondary.
Cooking oil as an additive component of candle essay
Leftists hate the world around them and want to change it: Conservatives just want to be left alone to make their own decisions and follow their own values.
They think that conservatives are as lacking in principles as they are. The shallow thinkers of the Left sometimes claim that conservatives want to impose their own will on others in the matter of abortion. To make that claim is however to confuse religion with politics.
More on that here Some Leftist hatred arises from the fact that they blame "society" for their own personal problems and inadequacies The Leftist hunger for change to the society that they hate leads to a hunger for control over other people.
And they will do and say anything to get that control: Leftist politicians are mostly self-aggrandizing crooks who gain power by deceiving the uninformed with snake-oil promises -- power which they invariably use to destroy.
Destruction is all that they are good at. Destruction is what haters do. Leftists are consistent only in their hate.
Cooking Oil as an Additive Component of Candle | Essay Example
They don't have principles. How can they when "there is no such thing as right and wrong"? All they have is postures, pretend-principles that can be changed as easily as one changes one's shirt I often wonder why Leftists refer to conservatives as "wingnuts". A wingnut is a very useful device that adds versatility wherever it is used.
Contributor Archives
The poverty of their argumentation is truly pitiful The Leftist assertion that there is no such thing as right and wrong has a distinguished history. It was Pontius Pilate who said "What is truth? From a Christian viewpoint, the assertion is undoubtedly the Devil's gospel "If one rejects laissez faire on account of man's fallibility and moral weakness, one must for the same reason also reject every kind of government action.
What there is consists only in the negation of the present.Introduction of TOPIC. Abstract: This study tries to find out the possibility of the used cooking oil as an additive component of candle. This study aims to produce a low-priced but high-quality candle by using used cooking oil as a major component.
procedure on how to use cooking oil as an additive candle METHODOLOGYFor an odor-free candle, use olive of oil image by Adrian Hillman from. The following candle compositions were used: percent paraffin wax; 90 percent paraffin and 10 percent oil; 80 percent paraffin and 20 percent oil; 70 percent paraffin and 30 percent oil; 60 percent paraffin and 40 percent oil; .
Sep 15, · This essay was originally published in six parts. Here are the links for part 1, part 2, part 3, part 4, part 5, and part 6. A plain HTML printer-friendly version is available Gates of Vienna. The game is not worth the candle.=Die Sache lohnt nicht.
The headline caught my eye this morning.= |Die Schlagzeile fiel mir heute morgen auf. The idea suggests itself.=Der Gedanke drängt sich auf. Mar 21, · The generic term "vegetable oil" when used to label a cooking oil product refers to a blend of a variety of oils often based on palm, corn, soybean or sunflower oils.
|
global_01_local_0_shard_00002368_processed.jsonl/46656 | Is there a way to convert a line or multiple lines into polygon?
I have a feature attribute as with, and the line represents the road. I want to convert every route into a polygon plane that somewhat looks like a road.
I think if line turns, then polygon will look disconnected. How to fix it, if possible?
Agree with @Michael use the Buffer option. It will create the polygon you require. The only thing u need to know is the width of the road. Different roads would have different width, so you might have to do it in batches, but then again its upto you if you want to keep a common width for all or go for different.
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/46671 | Esoteric Antithesis
There exist two Lodges that mutually combat each other: the White and the Black, light and darkness!
There, where the light shines, most limpid and intense, likewise the pitch-black darkness coincides with it. Thus, the double of every Angel of light is an Angel of darkness.
Thus, the double of every temple of light is a temple of darkness.
We have already explained the mystery of the twin souls in our Esoteric Treatise of Theurgy.
It is stated that the great Initiate Siddhartha Gautama (Shakyamuni Buddha) had a brother and rival named Devadatta, who, according to Buddhists, represents the king of hell.
Every person has a “human double” incarnated within them. This double is exactly alike in physiognomy, attitudes, manners, in certain capacities, etc. (note that this double is not a reference to the Ethereal Double or the Astral Double). This double is different, it is another type of “personality,” it is the antithetic twin soul. Such a soul is the “double.” This double possesses the same physical features. It is the exact antithesis of the person.
Likewise, the White Lodge has an antithesis: the Black Lodge. The black magicians of the Black Lodge struggle to swerve initiates off the path. This is why it is necessary, urgent, that the devotees defend themselves from the attacks of the tenebrous ones. Thus, it is urgent to learn how to do so.
Diverse Methods of Attack by the Tenebrous Ones
The tenebrous ones have, at their disposal, infinite resources in order to attack people in different ways:
1. During dreams.
2. During the vigil state.
3. By means of works of black magic.
4. By means of psychic obsessions.
5. By means of enmities
6. By means of organic illnesses.
7. By means of vices.
8. By means of certain aspects of culture.
9. By means of false prophets.
10. By means of the intervention of “inferior elementaries.”
Oneiric Seduction by Black Magicians
Those who tread the path are often erotically attacked by the tenebrous ones (usually at night) while their bodies repose during their normal sleep. Temples of black magic exist in the Internal Worlds, thus, naturally, their tenebrous members send certain very beautiful and seductive black sorceresses to male students, with the sole purpose of making them fall sexually.
They know that if the student spills the seminal liquid, the Kundalini descends and thus the weak and naive student loses power.
Mantric Chant
Therefore, it is necessary for the students to learn how to defend themselves from these tenebrous nocturnal erotic attacks. To that effect, the Angel Aroch revealed a mantric chant to us, for personal defense against the tenebrous ones. Sing this mantric chant before going to sleep:
Belilin... Belilin... Belilin...
Amphora of salvation.
I would like to be next to you;
Materialism has no power close to me.
Belilin... Belilin... Belilin...
These mantras must be chanted by placing all our love and sentiment into them. This is how we defend ourselves from the tenebrous ones.
Remember that in the dawning of life, the progenitors of the Gods delightfully sang (and thus taught) the Cosmic Laws to the builders of the Universe.
We must chant these mantras with all of our soul. We must chant them with profound emotion.
This is how we defend ourselves from the tenebrous ones.
When the human being becomes accustomed to practicing Sexual Magic every day, it is then impossible for the tenebrous ones to discharge his valuable seminal reserve; moreover, the nocturnal seminal emissions cease, if there were any at all.
Temptations in the Vigil State
Black magicians usually malevolently employ many people of the opposite sex in order to sexually attack the neighbor. This is “temptation.”
Thus, in any sexually tempting, critical situation, the aforementioned mantra also serves to edify an efficient defense against those perverse temptations.
The Vigil State and Bewitchments
Usually, black magicians malevolently and persistently employ their black magic in order to harm their victims. This is why frequently, certain patients with mysterious illnesses (which are the outcome of “bewitchments”) need to go to medical clinics. Typically, doctors will prescribe bromides and all kinds of medicines for stress. The sick patients ingest their dosage of medicine, nonetheless they continue going from bad to worse!
The utilization of dolls is one of the most detestable and common methods used by black magicians in order to harm their victims. Of course, we abstain from explaining how these dolls are used or how the tenebrous ones do it, so as not to provide weapons to certain irresponsible and inhumane individuals.
Symptoms and Theurgic Therapy
It is easily to recognize the symptoms of somebody who has been assaulted by means of dolls: The person feels a great anguish, intense palpitations of the heart, depression, piercing pains in the brain and externally on the temples, pain in the heart as well as in other areas of the body. In such cases, healing sessions must be arranged in order to cure these “bewitched” patients.
To that effect, the patient will be seated in a chair before a table covered with a white tablecloth. A crucifix, a glass of water and a lit candle will be placed on the table. The thaumaturgist (healer) will sit in front of the patient. Other concerned people, if any, such as friends or relatives of the patient, will also be seated around the table, under the condition that they possess a sincere faith of great strength.
Moreover, it is indispensable to place salt and alcohol on a plate. However, the salt must be previously prepared with the following exorcism:
Exorcism of Salt
In isto sale sit sapientia, et ab omni corruptione servet mentes nostras et corpora nostra, per Chokmahel et in virtute Ruach-Chokmahel, recedant ab isto fantasmata hylae ut sit sal coelestis, sal terrae et terris salis, ut nutrietur bos triturans et addat spei nostrae cornua tauri volantis. Amen.
Thereafter, when everything is properly arranged and set, the great Masters of Light must be invoked by reciting (in a loud voice) the Invocation of Solomon.
Procedure: Ignite the alcohol with a match so that it burns with the salt and recite the Invocation of Solomon in that precise moment as follows:
Powers of the kingdom, be ye under my left foot and in my right hand!
Mercy and justice, be ye the equilibrium and splendor of my life!
Intelligence and wisdom, crown me!
Spirits of Malkuth, lead me betwixt the two pillars upon which rests the whole edifice of the temple!
Angels of Netzach and Hod, establish me upon the cubic stone of Yesod!
Oh Gedulahel! Oh Geburahel! Oh Tiphereth!
Binahel, be thou my love!
Ruach Chokmahel, be thou my light!
Be that which thou art and thou shalt be, Oh Ketheriel!
Ishim, assist me in the name of Shaddai!
Cherubim, be my strength in the name of Adonai!
Beni-Elohim, be my brethren in the name of the Son, and by the powers of Sabaoth!
Elohim, do battle for me in the name of Tetragrammaton!
Malachim, protect me in the name of Iod-Havah!
Seraphim, cleanse my love in the name of Eloah!
Hasmalim, enlighten me with the splendors of Elohim and Shechinah!
Aralim, act!
Ophanim, revolve and shine!
Chaioth-Ha-Kadosh cry, speak, roar, bellow!
Kadosh, Kadosh, Kadosh!
Shaddai, Adonai, Iod-Havah, Eheieh asher Eheieh!
Hallelu-Jah, Hallelu-Jah, Hallelu-Jah.
Amen. Amen. Amen.
After having recited this invocation with fervor and with intense faith, we will beg the great Masters of the Light to heal the patient.
Sequentially, the theurgist will recite (filled with all of his spiritual strength of profound faith, and with confidence in his power), the following conjuration:
Conjuration of the Seven of Solomon the Sage
In the name of Michael, may Jehovah command thee and drive thee hence, Chavajoth!
In the name of Gabriel, may Adonai command thee, and drive thee hence, Bael!
In the name of Raphael, begone before Elial, Samgabiel!
By Samael Sabaoth, and in the name of Elohim Gibor, get thee hence, Andrameleck!
By Zachariel et Sachiel-Meleck, be obedient unto Elvah, Sanagabril!
By the divine and human name of Shaddai, and by the sign of the Pentagram which I hold in my right hand, in the name of the angel Anael, by the power of Adam and Eve, who are Iod-Chavah, begone Lilith! Let us rest in Peace, Nahemah!
By the holy Elohim and by the names of the Genii Cashiel, Sehaltiel, Aphiel and Zarahiel, at the command of Orifiel, depart from us Moloch! We deny thee our children to devour!
Amen. Amen. Amen.
Destruction of Malignant Fluids and Larvae by Means of Fire
Notice, it is also necessary to have next to the patient, a brazier (a metal pan for holding burning coals or charcoal, such as a hibachi), filled with charcoal that must be lit and left to get red-hot. Thus, with his right hand the theurgist will perform fast and energetic magnetic passes over the sick organs, and he will immediately cast the harmful, deleterious (magnetic) fluids (that have been removed from the victim) onto the burning charcoals.
Once the ceremony has ended, the patient must drink the glass of water that was on the table, since the Masters of the Light have already placed their sacred medicine within that water.
Saint Thomas stated that the concoction of sage and rue plants must be drunk to ward off spells; we should also smudge ourselves with them.
The procedure that we have revealed and taught here in order to heal the sick (who have been harmed by sorcery through dolls) can also be employed successfully to combat any type of bewitchment.
Black Elementals, Bats
We must warn students that not only do sorcerers use “dolls” in order to make their victims ill, but also the “elementals” of some animals. This is why witches or sorcerers possess millions of methods and influences in order to impiously cause all kinds of harm to their victims.
Unluckily, we met a black magician who sent vampires or bats to the homes of his hated victims with the intention of causing them fatal harm. Through his ominous “works” of black magic, by manipulating his armies of repugnant chiropters with malignant ability, this tenebrous man became wealthy. He nourished these innocent animals with plantain oils; nonetheless, when these elementals resisted in obeying him, he then punished them by denying them any type of food. We will obviously not explain the procedures of that sorcerer, because we do not teach black magic.
How to Trap Sorceresses by Surprise
Obviously, there exist sorceresses as well as sorcerers. These women possess secrets (i.e. as those which we have revealed in this book) in order to submerge their physical bodies within the fourth dimension. This is how they immerse their physical bodies within the tenebrous regions of Nature and travel to remote places in order to cause hideous damages to people. Nevertheless, it is easy to trap them.
The Method: On the floor, place a pair of scissors opened in the form of a cross, and scatter black mustard seed inside the room of the victim. This procedure will cause the witches to fall!
An Objective Testimony
We knew the case of a lady who did not believe in witches. She had the same mental conditioning as numerous other people have; she was intellectualized with concepts acquired through conventional culture.
Well then, the aforementioned woman visited a female cousin, who lived in the city.
In the evening, the two women saw a blackish bird, which looked like a buzzard or a vulture. This bird was perched on a tree in the outdoor patio of the house and from the tree the bird was mimicking the words that the two women were saying in their conversation and thereafter laughing at them.
That night, the cousin, who comprehended what this bird of evil omen was, placed a pair of scissors on the floor in the form of a cross and scattered black mustard seed inside of her bedroom.
The outcome was astounding: that evil omen bird, that was still perched on the tree in the outdoor patio, entered the bedroom of the house, flapped incessantly and then fell down upon the scissors! Thereafter, before the shocking eyes of her cousin, the bird inevitably was transformed into a woman. The woman was completely naked. Thus, the angry and inflexible cousin lashed the witch horribly with a whip and thereafter threw her out naked into the street. After a while some neighbors, feeling pity for the witch, gave her some clothes to cover up her body. This is a factual historical case.
Maculae Produced through Bewitchments
The wretched and suffering victims of bewitchments have their skin covered with huge black spots. Generally, the doctors of medicine do not ever manage to discover and understand the origin of these mysteriously colored maculae on the skin.
Nevertheless, these spots on the skin can also be healed (made to disappear) by means of the former liturgical ritual that was taught in this chapter. Nonetheless, we must warn that a single healing session is not enough in order to succeed. Any illness produced by bewitchment can be healed in exactly six months with constant, tenacious and persistent daily work.
When it is suspected that the victim has ingested some malignant substance, then, one spoonful of olive oil must be drunk daily on an empty stomach; one hour later (after drinking the olive oil), the person must drink the concoction of “epazote macho,” which is also called “yerba santa” or “paico.”
Saint Ignatius’ Fava Bean and “Yellow Water”
However, in very serious and desperate cases, the patient will be purged by consuming Saint Ignatius’ Fava Bean (which is a very drastic almond) on an empty stomach. Saint Ignatius’ Fava Bean will make the victims of the black magicians vomit the malignant substances from their stomach.
Likewise, in these cases, a cleansing of the stomach can be performed with what is called “Yellow Water.” This water is prepared in the following manner: Fill a one liter yellow colored bottle (or various bottles of the same yellow color) with water. Mix one gram of yellow vegetable aniline (food dye) in the water of each bottle (the aniline is the one utilized to dye candies or in the baking industry to make bread appear yellow. Do not ever use a mineral aniline or colorant).
Close the bottles and place them under the rays of the Sun for two hours. Thereafter, every hour, give the patient (who has been harmed with malignant substances) a glassful of this “Yellow Water” to drink. Continue the treatment constantly for as long as necessary.
“Funerary” Substances
There are patients who have been harmed without any scruples, without even the most basic scruples; they were harmed with funerary substances or with other types of suspicious substances, yet not less repugnant.
Likewise, these cases can be healed with the “Yellow Water.”
The person that became sick because of the ingestion of funerary substances, presents the following symptoms: a cadaverous color; if he is average (not too fat nor too thin) he becomes spectral, extremely skeletal and feeble, to the point that his bones are easily exposed; moreover, he feels a constantly moving, turning ball inside of his stomach.
A patient like this can be healed with the rite already described in this chapter, and with “Yellow Water.”
Children who have been perversely harmed with funerary substances also exist. However, in some of these cases the people who have caused the harm did it unintentionally and unconsciously. For example, we know of the case of a girl who was about two years old, whose physical appearance was exactly like that of a specter. This happened because her relatives had attended a burial or funeral in the cemetery. Thus, upon returning home from the burial ground, they made contact with the girl, and naturally, they touched her. Thus, in this way they contaminated her with deadly and infectious, bodiless vital fluids.
Physicians failed totally in this case. Yet, we, the brethren of the temple, prescribed for her nine healing baths of milk with peppermint. This bath is easily prepared: the peppermint plant is boiled with the milk, thereafter, bathe the sick child with it. These nine baths are taken for nine consecutive days. The outcome was excellent: the little girl was totally healed.
The Evil Eye
It seems incredible, yet the fact is that there exist people who have a terribly hypnotic force; when they look at a child, sometimes the child inevitably dies.
Symptoms: Great black circles under the eyes; fever in the head; vomiting and diarrhea.
In these cases the theurgist will execute magnetic passes over the whole body of the child, especially on the head and on the face. In this manner, he will imagine that he is removing the harmful fluids with energy; he will then immediately cast these (magnetic) fluids onto the hot embers of very well lit charcoal.
The energetic passes over the whole body are performed simultaneously with the recitation of the Conjuration of the Seven of the Wise King Solomon.
In most cases, thousands of children die in the cities due to this inflicted harm. The physicians who give the children death certificates usually affirm that these children have died because of an intestinal infection. A great number of children could be saved in the cities if their parents would utilize healing methods that can cure them; the parents should not worry about people’s open criticism.
The “evil eye” can be prevented by adorning the children with small gold rings placed on their small fingers or by making bracelets of genuine coral for them to wear. The jet mineral can also be used.
Magical Circle
The magical circle is utilized as a defense against the attacks of the tenebrous ones. This circle must not be completely closed since this drawn circle must be interrupted by the Seal of Solomon.
This seal is integrated by the two antagonistic ternaries: the ternary of the light and the ternary of the darkness.
The first is the Internal Christ of every human being: the resplendent Dragon of Wisdom: Father, Son, and Holy Spirit.
The second is the three-headed Black Dragon: the “psychological I,” which is composed of the three traitors that assassinated Hiram Abiff, who in turn is the Master, the superior ternary of the human being, his Inner God.
The Black Dragon is triune: it controls the Astral, Mental and Causal Bodies. This is the Medusa whose head is lodged with poisonous serpents.
Know well that every human being must decapitate Medusa with the flaming sword of Perseus.
Therefore, the disciples who want to defend themselves against the attacks of black magic must habituate themselves to mentally trace the magical circle.
The magical circle can be performed before falling into normal sleep or whenever it is necessary.
(Excerpt from Occult Medicine and Practical Magic: When you trace a Magical Circle around yourself, whether it be with your sword, or with your willpower and Imagination united in vibrating harmony (or with both at the same time), you must pronounce the following mantras: Helion, Melion, Tetragrammaton.)
Samael Aun Weor, The Major Mysteries |
global_01_local_0_shard_00002368_processed.jsonl/46673 | Goals lifestyle: Suffering is a Necessary Evil for the Goal-Oriented
Pain. I don’t like the sound of it. When I hear the word pain, what comes to mind is adjectives like victim, suffering, rejection and torture. Nobody loves the sound and feelings that come with suffering.
Has it ever been possible to get something you really want without suffering for it? Do you live sulking about the pain of success once you finally receive your desired object/person? No, you don’t. You only remember how the tough experience transformed you, taught you new stuff and opened you to new possibilities. You only remember how you realized your untapped potential because life had pushed you to your limits. You recall how the walls of self-limiting thoughts and beliefs had to disappear when you had no option but to put your best foot forward when life had pushed you to your limits. And most importantly, you were more proud of your success when you managed to go through it all and became successful despite the struggles endured.
Today’s article, however, acknowledges the suffering that helps us learn and grow – the suffering worth its reward. Today’s article embraces suffering for a worthy cause. Many a times, earning a worthy reward ( a goal or desire) has to cost us blood, sweat and tears before winning out your desired goal.
Pain, therefore, is a necessary evil when in the pursuit of something you really desire. It takes different forms:
• Letting go of some relationships that either stagnate or retard your progress
• Minimizing time spent in some places, with people that distract your quality time towards your goals/targets
• Maximizing time learning new skills and making new relationships in the spirit of your desired success
• Realigning your resources, with less going to leisure and more going towards support of your goals/ambitions
• Developing more of habits that bring you closer to success while saving you from failure.
The suffering for a worthy cause begins with enthusiasm though change is never easy. The faith and hope in the coming future is often shaken by the fear of change, a fear that often wants things to be the way they have always been. And since this form of suffering for a worthy cause is usually a move outside of your comfort zone, the obstacles met along the way tend to seem heavier to face than they actually are. And very soon,along the path to your success, you start feeling lonely and weak. You start wondering whether the effort is worth it with every disappointment bringing itself upon your your path to goals.
Regardless of all this, you need to embrace the spirit of a goals lifestyle: leading your life to reach your goals; living deliberately.
How do you help yourself in the journey of a goals lifestyle?
1. Make friends who understand the uncertain nature of your journey in the pursuit of your goals
2. Create a support system of information (articles, books, educational programs), people (online icons of the success you desire, examples to follow and mentors) and routines that directly correlate with, and remind you of the goals you desire of their fruitition
3. Take your time. Time is your friend when you understand that it is a buffer and an incubator in readiness of your success. It is a buffer when success could come too soon and therefore find you not ready for the desired results, and an incubator because great things take time. In this time of incubation, the resources, people and relationships necessary for your success gradually become aligned and making the fruition of your desired goal a possibility.
I have taken time and been able to understand two forms of suffering: the suffering for a worthy cause/outcome, and the suffering that creates despair & frustration. One form of suffering is constructive while the other is a vanity. Of interest is not the suffering that leads to frustration and despair. If you ever find yourself in a situation creating the feelings of despair and frustrations, kindly refuse that gift, for what is the point of going through a hard time unless you will be getting something better out of all the suffering?
Those familiar with religious and/or heroic stories understand that the admired characters also go through a suffering, which leads them to being wise, admired and honored in their respective societies. It would have hardly been possible to retell their interesting stories had they not been through dilemmas and difficult situations which had to be overcome.
Luke 24:26
Was not the Christ bound to undergo this suffering before entering in to glory?
Therefore, lead your life to reach your goals – live deliberately!
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/46674 | As the seasons turn, so do our wheels!
GObike Buffalo Community Workshop | January 26, 2020, 5:30-7:30 pm
Fix a Flat
Learn the ins and outs of fixing a flat. Includes hands on instruction on tube patching and tube and tire removal and reinstallation.
We will also discuss the different types of punctures as well as flat prevention.
All classes are held at the GObike Community Workshop (98 Colvin Ave) on Sundays from 5:30pm-7:30pm. Cost for classes is $10 plus any needed supplies & most classes are limited to 10 people. Please RSVP to at least TWO days prior to class if you plan to attend. |
global_01_local_0_shard_00002368_processed.jsonl/46684 | Unfair Dismissal
The employment lawyers at Gordon Legal in Sydney and Melbourne are some of the most experienced practitioners in Australia with the unique advantage of a focus and passion for advising employees about their rights and entitlements. One question our employment lawyers get most often asked about is about unfair dismissal.
Contrary to urban myth, the protection against unfair dismissal does not apply to all employees in Australia covered by the Fair Work Act. It is important that you check whether you qualify prior to filing any application contesting your dismissal.
What is an unfair dismissal?
The Fair Work Commission has the power to decide if on an unfair dismissal. For it to be satisfied that it was an unfair dismissal, the Commission must find:
1. The person has been dismissed from the employment; and
1. The dismissal was harsh, unjust or unreasonable; and
1. The dismissal was not consistent with the Small Business Fair Dismissal Code; and
1. The dismissal was not a case of genuine redundancy.
We discuss each of the elements below.
A person has been dismissed from employment if:
1. The persons employment has been terminated on the employers initiative; or
1. The person resigned from their employment but was forced to do so because of conduct or a course of conduct engaged in by their employer.
Harsh, Unjust, Unreasonable?
The Fair Work Commission considers set criteria in answering this question:
1. Whether there was a valid reason for the dismissal related to the employees capacity or conduct; and
1. Whether the person was notified of the reason for dismissal; and
1. Whether the person was given an opportunity to respond related to any reason related to the capacity or conduct of the person; and
1. Any unreasonable refusal by the employer to allow a support person to be present to assist in any discussions relating to the dismissal; and
1. If the dismissal related to unsatisfactory performance, whether the person was warned about that performance prior to the dismissal; and
1. The degree to which the size of the employers enterprise would be likely to impact on the procedures followed in effecting the dismissal; and
1. The degree to which the absence of dedicated human resource management specialists or expertise would likely have impacted on the procedures followed in effecting the dismissal; and
1. Any other matters that FWC considers relevant.
The role of the Fair Work Commission is to weigh up all of the factors in totality before deciding whether it was an unfair dismissal.
Small Business?
A small business employer is defined as an employer with less than 15 employees. Because of complex company and corporate structures, counting the 15 can be a complex task and it is always important to check to determine how you might context an unfair dismissal as the Small Business Fair Dismissal Code might apply.
Genuine Redundancy?
A genuine redundancy can defeat an unfair dismissal claim. A genuine redundancy is defined as:
1. The employer no longer requires the job to be performed by anyone or because of the changes in the operational requirements of the employers enterprise; and
Importantly, if the employee could have been redeployed, then the dismissal will not be a genuine redundancy.
Who is protected?
An employee is protected from unfair dismissal is they are able to satisfy the following criteria:
1. The person is an employee;
1. The person has completed a minimum period of employment with their employer (the minimum period is 6 months or if you are employed by a small business employer – one year); and
2. A modern award covers the employee; OR
1. An enterprise agreement applies to the employee in relation to the employee; OR
1. The employee income and other relevant earnings do not exceed the high income threshold (set at $145,400 as at April 2019. This amount is indexed each year on 1 July).
How to bring a claim?
An employee who wishes to bring an unfair dismissal claim must file a claim with the Fair Work Commission within 21 days of the dismissal. This is a strict time limit and can only be extended by the Fair Work Commission in exceptional circumstances.
How can Gordon Legal help?
Gordon Legal are experienced employment lawyers in Sydney and Melbourne who take pride in the fact that our passions line up with assisting employees in unfair dismissal matters. The employment lawyers at Gordon Legal specialise in winning unfair dismissal claims and defending fairness in the workplace. Contact our friendly team on 1800 21 22 23 to discussion your claim. Make sure you don’t delay because of the strict deadlines. |
global_01_local_0_shard_00002368_processed.jsonl/46690 | Grace's Guide
British Industrial History
Grace's Guide is the leading source of historical information on industry and manufacturing in Britain. This web publication contains 137,357 pages of information and 220,748 images on early companies, their products and the people who designed and built them.
Charles Portway
From Graces Guide
Jump to: navigation, search
Charles Portway (c1829- ) of C. Portway and Son
1881 Living at High Street, Halsead, Essex: Charles Portway (age 52 born Bury St Edmunds), Ironmonger and Stove Maker employing 17 men and 8 boys. With his wife Emma Edith Portway (age 25 born Halstead) and their two children Harry H. Portway (age 23 born Halstead), Ironmonger, and Ethel Portway (age 18 born Halstead). Also a visitor. Two servants.[1]
See Also
Sources of Information
1. 1881 Census |
global_01_local_0_shard_00002368_processed.jsonl/46732 | Is 100 Percent Fruit Juice Healthy?
Written by Mike Samuels; Updated December 12, 2018
Is 100 Percent Fruit Juice Healthy?
Is 100 Percent Fruit Juice Healthy?
You may think fruit juice is a healthy way to start your day or a convenient method of increasing your consumption of fruits, vegetables, vitamins and minerals. Even though it has some health benefits, 100 percent juice also has drawbacks you may wish to consider before pouring your next glass.
What is 100 Percent Juice?
Juice labeled "100 percent" is made purely from the juice of natural fruits. It has no additives, sweeteners or preservatives in it, according to nutritionist Katherine Zeratsky of the Mayo Clinic. The vitamin and mineral content is far higher in 100 percent juice than it is in sweetened juice or fruit juice cocktails, she adds.
Benefits from Juice
A high intake of fruits and vegetables is essential for optimal health. The U.S. Department of Agriculture recommends a minimum of 1 1/2 to 2 cups of fruit per day for women and 2 cups for men, and a cup of 100 percent fruit juice can count as one of your fruit servings. Juice can also be an excellent provider of vitamins and minerals, particularly vitamin C. The recommended dietary allowance for vitamin C for men is 90 milligrams and for women 75 milligrams daily. Three-quarters of a cup of orange juice provided 93 milligrams of vitamin C, while the same amount of grapefruit juice has 70 milligrams and tomato juice, 33 milligrams.
Sugar vs. Fiber
While 100 percent juice may be a convenient way to consume extra vitamins and minerals, it can be packed with sugar. Nutritionist Dr. Jonny Bowden recommends eliminating fruit juice from your diet entirely -- it's full of sugar and has none of the fiber that real fruit does. While whole fruit is a source of dietary fiber, fruit juice actually contains little to no fiber. A cup of apple juice, for instance, has 0.2 gram of fiber, while a whole apple contains 3.3 grams. One cup of orange juice has 0.5 gram of fiber while a cup of fresh raw orange has 4.3 grams. Drinking fruit juice before a meal may actually make you hungrier, too -- it not only adds calories, but can cause you to eat more calories in the following meal, according to Medline Plus.
Practice Portion Control
The most important aspect to consider when deciding whether to incorporate fruit juice into your diet is whether it fits into your recommended calorie intake. A half-cup of grape juice contains 80 calories; the same serving of apple juice has 60 calories, as does orange juice. If you wish to drink 100 percent juice and monitor your food intake accordingly to accommodate this, it can be a healthy way to increase your consumption of vitamins and minerals. However, juice can be extremely easy to over-consume, which may take you over your recommended daily calorie intake.
About the Author
Mike Samuels
bibliography-icon icon for annotation tool Cite this Article |
global_01_local_0_shard_00002368_processed.jsonl/46740 | Lattice integrates with HRIS including BambooHR, Zenefits, Namely, and ADP. If you’re running into issues, you’ll want to check the following:
1. Make sure that you’re an Admin of both Lattice and your HRIS.
2. Check that employees in your HRIS all have a “Pay Type” and an email address.
3. If you have integrated BambooHR, check the Import Log in Lattice. Learn more about how to access this here
4. Once this is done, try re-syncing by going to Admin > Integration > Sync
5. If a re-sync doesn’t work, you may want to re-configure your integration.
6. To re-configure your integration, click “reset.”
7. Make sure to pull in ALL Pay Types or just the Pay Type of the employees you want in Lattice. Ex. If you don’t want contract workers or part time workers to be users in Lattice, you would only pull in “Full Time,” if you do, make sure to check them as well.
8. Once you’ve tried all of the above, and your employees are still not being pulled into Lattice from your HRIS, you’ll want to reach out to us at [email protected]
Did this answer your question? |
global_01_local_0_shard_00002368_processed.jsonl/46741 | 1b. Manage IM Form Size
See Quick Start Guide – Form Builder Customization for the context of this article. The previous article was 1a. Manage IM Teams (Constructors) and the next article is 1c. Manage IM Form Information.
IM Forms can be set to fit the size of the expected user’s screen or can be left responsive so that users can resize the form to suit their preferences.
Set IM Form Size
To set the size of an IM form when adding or editing an IM form:
1. Click the cogwheel-shaped button in the blue header bar.
Open form information menu v45500 set form size
2. Select the:
• Disable Resizing radio button: To make the form responsive so it can be resized.
• Enable Resizing radio button: To force the form to fix a certain screen size.
• Type a Width and Height (both in pixels).
3. Click Save & Close.
4. Next steps:
Back to the top arrow
0 found this helpful. |
global_01_local_0_shard_00002368_processed.jsonl/46743 | What other apps does Zapier work with?
Zapier works with hundreds of apps! Here is a link to the Zapier app directory:
We have created shared Zaps for the most commonly requested automated features to be used with Trainerize. You can find these in your Trainerize account under Settings (the gear or cog icon) under App Automation.
Shared Zaps are basically templated Zaps so that you can use them quickly and easily.
Trainerize provides support for the use of the Shared Zaps. Any other connections made with Zapier will be supported by Zapier's help team.
Related Articles
Have more questions? Submit a request
Article is closed for comments. |
global_01_local_0_shard_00002368_processed.jsonl/46749 | Herr Döring
Haferstr. 5c
86179 Augsburg
Content of the Website
I do not take over any guarantee for the topicality, correctness, completeness or quality of the provided information. Liability claims against me, which refer to material or immaterial damage caused by the use or non-use of the information provided or by the use of incorrect or incomplete information, are generally excluded, unless there is evidence of wilful intent or gross negligence on my part.
|
global_01_local_0_shard_00002368_processed.jsonl/46761 | There are many theories as to who they were. The wiki page has nine hypotheses.
What is the most widely accepted theory on who the ancient Sea Peoples were?
• 3
Sorry, but if you are linking to wikipedia in your question, which has information on them, what are you trying to get here in addition? Theory is nice but it's pretty broad. – MichaelF Nov 2 '11 at 11:55
• 2
The question states quite clearly I want to know the most widely accepted theory – YUASK Nov 2 '11 at 13:03
• 4
It's just linking to a wikipedia article and asking something off it without much detail here, that doesn't really add much to our site. I'd expect more detail here on the question. Just to note I didn't downvote, I just asked about the question. – MichaelF Nov 2 '11 at 15:08
• 4
I think it's a valid question. Though Wikipedia lists allot of information, its Non-POV position means that it weights all possible theories evenly, even though some are less well supported than others. It's quite right to ask if any of the six theories is more likely than the others. – Rincewind42 Nov 2 '11 at 15:19
• 7
Wikipedia also has a habit of portraying fringe theories as equally valid, even when they have been dismissed by serious researchers. – Canageek Nov 2 '11 at 20:53
The sea peoples are in Egyptian sources referred to as "foreign people of the sea". It is in other words a name they use for any sea-faring foreigners that attack Egypt. Some of the sources list the names of these sea peoples, making it clear that it is not one people that is meant.
The theories mentioned on Wikipedia may therefore all be correct at the same time.
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/46770 | The Caribian
23. Januar 2000
Moving and dancing around
Singin' and loughin' out loud
The caribian
Music-and they dance
And get a wild romance
The caribian
Dancin' cheek to cheek
Never want to sleep
The caribian
The sun always shines in the land
Of deep blue sea
And my loveboat of dreams
Is taking me away...
The boys are always smiling,
With lury eyes they're adding fuel
To the flames
Of my desire
Mini-skirts and wet T-shirts
And moves like "Giv'me just a word"
Come dance with me
I'm on fire
Loveboats swinging time,
Summer sun and wine
The course lays straight ahead
'til morning
The music plays this song now
And everyone feels strong now
And full of joy
And desire
Now it's party-time,
Loveboat on the line
In the caribian, caribian
It's party-time! |
global_01_local_0_shard_00002368_processed.jsonl/46788 | 10 Most Common Phobias
The 10 most common phobias and which Hypnotherapy can help change:
Although many phobic responses are detailed below, Georgina has found that, although the phobic feelings have been linked to a specific object, in the outcome it often emerges that it is FEAR itself which is the problem, not the object! The object is often just something to which the fear has become attached. Hypnotherapy helps to identify the fear and thus remove the object of the fear as a catalyst for the symptoms of fear. You will not be asked to confront your fear or the object of it – you will find that your fear just disappears!
For a full list of Phobias in Alphabetical order click here
For a full list of descriptive Fears click here
Return to Fears/Phobias Page
The 10 most common phobias that Hypnotherapy and/or NLP can change:
1. Arachnophobia
2. Sociaphobia
3. Aviophobia
4. Agoraphobia
5. Claustrophobia
6. Acrophobia
7. Emetophobia
8. Carcinophobia
9. Brontophobia
10. Necrophobia
Get rid of all your fears and phobias now by clicking here
10 Most common phobias that Hypnotherapy and/or NLP can help change :
1. Arachnophobia ¦return to top¦
Arachnophobia is a specific phobia, an abnormal fear of spiders. It is estimated half of all women, and a quarter of all men in the UK have this phobia and is among the most common of phobias.
The fear of spiders can be treated by use of Hypnotherapy and NLP techniques suggested for specific phobias.
Arachnophobia is, in many cases, the result of a traumatizing encounter with spiders in one’s early childhood, though the experience may not be remembered. An evolutionary reason for the phobias, such as arachnophobia, claustrophobia, fear of snakes or mice, etc. remains unresolved. One view, especially held in evolutionary psychology, is that sufferers might gain some survival edge, by avoiding the dangers. Spiders, for instance, being relatively small, don’t fit the usual criteria for a threat in the animal kingdom where size is a key factor, but many species are venomous, and some are lethal. Arachnophobes will spare no effort to make sure that their whereabouts are spider-free, hence reducing sharply the risk of being bitten.
2. Sociaphobia ¦return to top¦
Fear of being evaluated/judged negatively in social situations.
Social anxiety.
Social anxiety is an experience of fear, apprehension or worry regarding social situations and being evaluated by others. People vary in how often they experience anxiety in this way or in which kinds of situations. Anxiety about public speaking, performance, or interviews is common.
Social anxiety disorder also referred to clinically as social phobia, is a psychiatric anxiety disorder involving overwhelming anxiety and excessive self-consciousness in everyday social situations. People experiencing social anxiety often have a persistent, intense, and chronic fear of being watched and judged by others and being embarrassed or humiliated by their own actions. Often the triggering social stimulus is a perceived or actual scrutiny by others.
Their fear may be so severe that it significantly impairs their work, school, social life, and other activities. While many people experiencing social anxiety recognize that their fear of being around people may be excessive or unreasonable, they encounter considerable difficulty overcoming it. This differs from shyness, in that the person is functionally debilitated and avoids such anxiety provoking situations by all means. At the same time, a person with social anxiety may only feel the fear of the disorder during certain situations. For example, an actor or singer may feel fine on stage, but afraid of social situations in everyday life.
Social anxiety is often part of only a certain situation—such as a fear of speaking in formal or informal situations, or eating, or writing in front of others—or, in its most severe form, may be so broad that a person experiences symptoms almost anytime they are around other people. Many people have the specific fear of public speaking, called glossophobia. In this case, the fear is not actually of public speaking, but a fear of doing or saying something which may cause embarrassment.
Approximately 13.3% of the general population will experience social phobia at some point in their lifetime; with the male to female ratio being 1.4:1.0, respectively.
Physical symptoms often accompany social anxiety, and include blushing, profuse sweating, trembling, nausea, and stammering. Panic attacks may also occur under intense fear and discomfort. An early diagnosis helps in minimizing the symptoms and preventing other mental illnesses such as depression. Some sufferers also use alcohol or drugs to reduce fears and inhibitions at social events, which in itself can lead to further problems.
A person with the disorder may be treated with Hypnotherapy and/or NLP very successfully.
Attention given to social anxiety disorder has significantly increased since 1999 with the approval of drugs for its treatment. Marketing campaigns by pharmaceutical companies may be largely responsible for driving this.
3. Aviophobia ¦return to top¦
Fear of flying.
Fear of flying is a fear of air travel. It is also known as aviatophobia or aviophobia. Commercial flight has become an important, even essential, part of modern life; yet flying continues to cause a significant proportion of the public to feel anxiety. Fear of flying seems to contradict the facts; for example, driving in an automobile is statistically many times more dangerous.
The fear of flying may be created by various factors:
a fear of closed in spaces (claustrophobia), such as that of an aircraft cabin
• a fear of heights (acrophobia)
• a feeling of not being in control (since a passenger is not piloting the plane and can’t get out at will)
• previous traumatizing experiences while in flight
• fear of hijacking or terrorism
• fear of deep venous thrombosis
• fear of turbulence
• fear of having a panic attack
Some people blame the media as a major factor behind fear of flying, claiming the media sensationalizes airline crashes (and the high casualty rate per incident), in comparison to the perceived scant attention given the massive number of isolated automobile crashes.
Some people who are afraid of flying manage their fears well enough that they are able to fly, but they may still spend considerable time and emotional energy thinking about the dangers that may befall them during flight.
A few people are nearly incapable, however, of getting on a plane, and must use cars, trains, buses and ships – all of which are slower and usually less safe than airplanes – to achieve long distance travel.
Like many phobias, fear of flying may “generalize” to cause fear of flight-related situations or stimuli. Many individuals with a strong fear of flying report anxious symptoms or panic attacks when discussing air travel, when seeing airplanes overhead, when visiting airports (even when not embarking on air travel themselves), or when watching television programs or films that depict air travel.
4. Agoraphobia ¦return to top¦
Agoraphobia is a form of anxiety disorder, the abnormal fear of expecting or experiencing a difficult or embarrassing situation from which the sufferer cannot find an escape.
The word is an English adoption of the Greek words agora and phobos. Literally translated in modern Greek as “a fear of the marketplace”.
This translaton is the reason of the common misconception that agoraphobia is a fear of open spaces. This is most often not the case since people suffering from agoraphobia usually are not afraid of the open spaces themselves, but of public spaces or of situations where a person is afraid of having a panic attack and will not be able to receive help.
Another misconception is that agoraphobia is a fear of “crowded spaces” (which would be the social anxiety disorder). Once again, an agoraphobiac does not fear people: he or she rather fears an embarrassing situation with no escape. Some people with agoraphobia are comfortable seeing visitors, but only in a defined space in which they feel able to control. Such people may live for years without leaving their homes, while happily seeing visitors and working, as long as they can stay within their safety zones.
Agoraphobics may experience severe panic attacks in situations where they feel trapped, insecure, out of control, or too far from their personal comfort zone. During severe bouts of anxiety, the agoraphobic is confined not only to their home, but to one or two rooms and they may even become bed-bound until their over-stimulated nervous system can quieten down, and their adrenaline levels can return to a more normal level.
Agoraphobics are often extremely sensitized to their own bodily sensations, subconsciously over-reacting to perfectly normal events. To take one example, the exertion involved in climbing a flight of stairs may be the cause for a full-blown panic attack, because it increases the heartbeat and breathing rate, which the agoraphobic interprets as the start of a panic attack instead of a normal fluctuation.
People with severe agoraphobia develop the ability to avoid situations that may bring on an attack.
The one-year prevalence of agoraphobia is about 5 percent. Agoraphobia occurs about twice as commonly among women than men (Magee et al., 1996). The gender difference may be attributable to social/cultural factors that encourage, or permit, the greater expression of avoidant coping strategies by women, although other explanations are possible.
5.Claustrophobia ¦return to top¦
Conversely, people who are prone to having panic attacks will often develop claustrophobia. If a panic attack occurs while they are in a confined space, then the claustrophobe fears not being able to escape the situation. Those suffering from claustrophobia might find it difficult to breathe in closed auditoriums, theatres, and elevators/lifts. Like many other disorders, claustrophobia can sometimes develop due to a traumatic incident in childhood.
Claustrophobia can be dealt with in similar ways to other anxiety disorders, with a range of interventions including cognitive behavior therapy and now with Georgina’s Liberation! Technique.
Popularly, claustrophobia is considered to be the opposite of agoraphobia, or a “fear of open spaces”. This is an oversimplification, however: claustrophobes may also fear being in crowds, and agoraphobia can also be characterized as a “fear of public spaces”, and so a crowded city square might trigger claustrophobics and agoraphobics alike.
6. Acrophobia ¦return to top¦
Acrophobia (from Greek meaning “summit”) is an extreme or irrational fear of heights. It is a particular case of specific phobias, which share both causes (differing in the source of the phobia) and options for treatment.
Acrophobia can be dangerous, as sufferers can experience a panic attack in a high place and become too agitated to get themselves down safely. Some acrophobics also suffer from urges to throw themselves off high places, despite not being suicidal.
“Vertigo” is often used, incorrectly, to describe the fear of heights, but it is more accurately described as a spinning sensation.
Causes of acrophobia
The most widely accepted explanation is that acrophobia stems from fear — fear of falling and being injured or killed: this is a normal and rational awareness that most people have (people without such awareness would die out). It becomes irrational and out of control when the awareness becomes the focus of attention.
A phobia occurs when fear is taken to an extreme — possibly through conditioning or a traumatic experience. Then, the mind seeks to protect the body from further trauma in the future, and elicits an extreme fear of the situation — in this case, heights.
This extreme fear can be counter-productive in normal everday life though, with some sufferers being afraid to go up a flight of stairs or a ladder, or to stand on a chair, table, (etc.).
Some neurologists question the prevailing wisdom and argue that acrophobia is caused by dysfunction in maintaining balance and that the anxiety is both well founded and secondary. According to the dysfunction model, a normal person uses both vestibular and visual cues appropriately in maintaining balance.
An acrophobic overrelies on visual signals whether because of inadequate vestibular function or incorrect strategy. Locomotion at a high elevation requires more than normal visual processing. The visual cortex becomes overloaded and the person becomes confused. Research is underway at several clinics. Some proponents of the alternate view of acrophobia warn that it may be ill-advised to encourage acrophobics to expose themselves to height without first resolving the vestibular issues.
Notable people with acrophobia:
• Bill Engvall
• Rebecca Herbst
• Mihir Gandhi
• April Margera
Popular culture
• Vertigo — a film by Alfred Hitchcock in which detective John “Scottie”/”Johnny Oh” Ferguson (James Stewart) , a police officer, feels vertigo and becomes acrophobic after losing his partner in a high fall
• Monk – Adrian Monk has a phobia = fear of height.
• High Anxiety — a spoof by Mel Brooks in which the main character, a leading psychiatrist, is acrophobic, but throughout the film the disorder is medically referred to as “high anxiety”
• In The Muppet Christmas Carol, Rizzo the Rat claims that he is acrophobic.
• In Code Lyoko, Ulrich Stern has an extreme case of acrophobia which throughout the episode is incorrectly stated as vertigo.
7. Emetophobia ¦return to top¦
Emetophobia is an excessive or irrational fear of vomiting or of being around others who are vomiting. It is one of the most common specific phobias. In survey research, six percent of the U.S. population claims to fear being sick, although a much smaller number suffer from actual emetophobia, which manifests itself through a variety of phobic behaviour.
It is unknown what exactly causes Emetophobia to develop, but the accepted theory says that Emetophobia can be the result of a traumatic incident of vomiting between the ages of six and ten. Most emetophobics claim they can will themselves to avoid vomiting, and a survey of an Internet group of emetophobics found that the average member had last vomited at least twelve years earlier. On average, it is suggested that most emetophobics have been sick five or fewer times in their lives.
Emetophobics are known to go to great lengths to avoid people who may be sick or where a threat of infection is perceived. Some Emetophobics will avoid being in public places where they fear people may vomit or where they think there may be a higher probability of someone vomiting (such as a bar or a nightclub). Many emetophobics would rather endure prolonged nausea than face the fear of vomiting; in fact, emetophobes can tolerate nausea for more than twenty hours, while the average person would vomit to relieve nausea after an average of twenty minutes.
Emetophobia and Eating.
Nearly all Emetophobics will practice eating habits that may seem strange if noticed by non-Emetophobics, ranging from pickiness to superstitions about foods to anorexia. Such eating habits may include refusing to eat any food that they have touched with their hands (as opposed to cutlery) and eating their food in a specific order. Others may eat in a way they believe will minimize the chance of vomiting or nausea. Emetophobics often follow strict diet regimes that consists of ‘safe foods’ and foods that are known to produce the least likely chance of food poisoning – meat and dairy products for example will often be avoided or abstained from completely. Emetophobics will often avoid foods that they ate on or around the time they last vomited, for fear that eating them again will either bring back disturbing memories, or through a superstitious belief that eating the same food may lead them to vomit again. Additionally, many emetophobes experience gastrointestinal problems such as IBS or lactose intolerance, and pay careful attention to their digestive systems, believing that any discomfort or pressure will lead to gastroenteritis.
Emetophobia and Mental Health
Emetophobes can suffer from pervasive anxiety and/or depression. Emetophobics may also exhibit superstitious behaviour that borders on obsessive-compulsive. Anxiety concerning vomiting, or being in proximity to anyone that might vomit can cause irrational behaviour, and often induce panic attacks. Emetophobia can have a very difficult and stressful influence on everyday life, the very nature of the illness being ever present as the phobic stimulus is internal to the individual.
Most emetophobics fear vomiting themselves, but in some cases, it has been claimed that fear of seeing other people vomit can induce an even greater phobic response than if they were to be sick themselves.
Emetophobic Habits.
• Avoiding sick people
• Avoiding overeating
• Compulsive hand-washing
• Compulsive expiration
• Date checking
• Avoiding long car trips or long means of transportation also has to be close to a bathroom
• Cannot fall asleep unless hungry.
• Become very nervous when going to public places (mall, movies, etc.) in fear of seeing someone vomit or vomiting themselves.
8. Carcinophobia ¦return to top¦
Defined as “cancer”, each year this surprisingly common phobia causes countless people needless distress.
To add insult to an already distressing condition, most cancer phobia therapies take months or years and sometimes even require the patient to be exposed repeatedly to their fear. We believe that not only is this totally unnecessary, it will often make the condition worse.
Known by a number of names – Cancerophobia, Carcinophobia, and Fear of Cancer being the most common – the problem often significantly impacts the quality of life.
It can cause panic attacks and keep people apart from loved ones and business associates. Symptoms typically include shortness of breath, rapid breathing, irregular heartbeat, sweating, nausea, and overall feelings of dread, although everyone experiences cancer phobia in their own way and may have different symptoms.
Though a variety of potent drugs are often prescribed for cancer phobia, side effects and/or withdrawal symptoms can be severe. Moreover, drugs do not “cure” cancer phobia or any other phobia. At best they temporarily suppress the symptoms through chemical interaction.
The good news is that the modern, fast, drug-free processes that Georgina uses will train your mind to feel completely different about cancer, helping to eliminate the fear so it never haunts you again.
Consider the true cost of living with Cancer Phobia.
If you are living with cancer phobia, what is the real cost to your health, your career or school, and to your family life? Avoiding the issue indefinitely would mean resigning yourself to living in fear, missing out on priceless life experiences big and small, living a life that is just a shadow of what it will be when the problem is gone.
For anyone earning a living, the financial toll of this phobia is incalculable. Living with fear means you can never concentrate fully and give your best. Lost opportunities. Poor performance or grades. Promotions that pass you by. cancer phobia will likely cost you tens, even hundreds of thousands of pounds over the course of your lifetime, let alone the cost to your health and quality of life.
What is the cause of Cancer Phobia?
Like all fears and phobias, cancer phobia is created by the unconscious mind as a protective mechanism. At some point in your past, there was likely an event linking cancer and emotional trauma. Whilst the original catalyst may have been a real-life scare of some kind, the condition can also be triggered by myriad, benign events like movies, TV, or perhaps seeing someone else experience trauma.
But so long as the negative association is powerful enough, the unconscious mind thinks: “Ahh, this whole thing is very dangerous. How do I keep myself from getting in this kind of situation again? I know, I’ll attach terrible feelings to cancer, that way I’ll steer clear in future and so be safe.” Just like that cancer phobia is born. Attaching emotions to situations is one of the primary ways that humans learn. Sometimes we just get the wiring wrong.
9. Brontophobia ¦return to top¦
Fear of thunderstorms.
Astraphobia also known as Brontophobia, Ceraunophobia, or Tonitrophobia is fear of thunder and lightning.
It is especially common in young children.
Symptoms (similar for all other extreme phobias) include panic attack, difficulty in breathing, rapid heartbeat, sweaty palms, and nausea. Sometimes these feelings can be overwhelming.
The phobia is extremely common. It can be totally debilitating.
Many people try to cope with their fear by hiding. Children typically hide in windowless places, such as the cupboard under the stairs, or under the bed. (Anywhere where they can’t see or hear the storm).
Treatment for Astraphobia is similar for that of all other phobias – hypnotherapy, combined with deliberate slow breathing and change of focus.
References in fiction
• Characters in Videogames and Anime that Have Astraphobia
• The character Rikku in the videogame Final Fantasy X
• The character Shion Uzuki in the videogame series Xenosaga
• The character Haruhi Fujioka in the anime Ouran High School Host Club
• The character Tails in the anime Sonic OVA
10.Necrophobia ¦return to top¦
Necrophobia or thanatophobia is fear of death or dead things. The former term is derived from Greek nekros for “corpse” and suffix -phob- for “fear”. The latter term is derivied from Thanatos (“death”) is the personification of death.
The usage differs, although in common speech the terms are used interchangeably.
Necrophobia is fear of death in general and things associated with it, e.g., of corpses, mummies, etc.
Thanatophobia does include but is not limited to the fear of personal death or dying.
Part eight of Anna Karenina contains through the character Levin some of Tolstoy’s thoughts of thanatophobia. |
global_01_local_0_shard_00002368_processed.jsonl/46799 | Policy-making for digital development: the role of the government
Work data:
ISBN: 978-1-4503-0787-1
Type of work: Communication
e-Readiness | ICT4D | Information Society
Our research focuses on whether there is a need for action by governments - and the public sector in general - to promote the Information Society and, if any, what should be the specific role of them.
We first define several stages of digital development at the country level through cluster analysis, which we characterize by means of contingency tables or cross tabulations. One of our first findings is that most countries follow a similar path of digital development, and one that has a strong correlation with socioeconomic development: higher levels of wealth and economic development, education and the existence of digital infrastructures almost always coincide with higher levels of digital development. However, we also find outlying economies that follow their own digital development structure: leapfroggers.
We then perform binomial logistic analysis to find out the reasons of being a digital leader or laggard. Besides the usual socioeconomic indicators causing higher or lower digital development levels, we also find that Governments can accelerate the process of digital development through the adoption of public policies that frame and foster the Information Society – such as Government prioritization of ICT and assigning a high importance to ICT in government vision of the future – and establishing an appropriate Economic Incentive Regime. This will raise the probability of a country of reaching higher stages of digital development.
Related works: |
global_01_local_0_shard_00002368_processed.jsonl/46820 | Tag Archives: Schooner Breakwater
A Sealing Voyage to the Falkland Islands aboard the Schooner Breakwater of Stonington
I’m now researching a sealing voyage to the Falkland Islands that was made in 1830 and 1831. At least three of the men involved in this expedition were Indians, including Moses Brushell, Henry Shantup, and Charles Skeesucks. Here are some … Continue reading
|
global_01_local_0_shard_00002368_processed.jsonl/46821 |
Capital Games
From IndieCade Wiki
Jump to: navigation, search
Capital Games logo
For almost 15 years, Capital Games has been playing video game interests in Île-de-France, thanks to the support of its institutional partners. The association advises and directs the companies in its network on all the entrepreneurial issues: financing, export, marketing, human resources management, and more.
See Also[edit | edit source] |
global_01_local_0_shard_00002368_processed.jsonl/46824 | Recent Reviews
The HEARTS Agency is a group of extraordinary women who are private investigators. They look into everything from cheating husbands to missing persons. The leader, Holly Austen has been working on a missing person case for too long. Too long for there to be a positive result, and the police have come to a dead-end. But Holly won’t give up.
Frederica is the free-spirited daughter of a merchant. She lives for nature and is skilled in painting the very landscapes that inspire her. She has always been entranced by the Earl’s son, Hawthorne. She is tricked by some cruel boys and severely traumatized. Not only is she a merchant’s daughter and considered mad since she suffers from PTSD, she soon discovers a dark family secret. |
global_01_local_0_shard_00002368_processed.jsonl/46827 | her story
Ina Yosun Chang
AR/VR Software Developer and Founder & CTO, AReality3D
Ina Yosun Chang has prototyped thousands of 3D AR/VR apps at hackathons – and for agencies, companies, VCs and startups as a massively-parallel (and serial) freelancer. To build even more stuff, she made her own framework called RealityScript, which powers entire platforms for 3D AR+VR startups. A creative technologist at heart, she likes to use technology in ways that may make the hack seem like magic.
Previously, when she was known as Ina Centaur, she tried a social experiment locking herself in a room for two years to do nothing but create stuff in the virtual world of Second Life. She founded and became the artistic director of the SL Shakespeare Company (renamed mShakespeare) – where she got to do everything form designing the actor’s faces to costumes to theatres – as well as theatrical knickknacks in VR. (She also built a Flash creation platform during high school and created GREPhysics.net about a decade ago before leaving physics grad school.) |
global_01_local_0_shard_00002368_processed.jsonl/46846 | 0 votes
1 view
in Blockchain by (7k points)
Currently reading solidity documentation: https://solidity.readthedocs.io/en/develop/types.html#function-types
This does not make sense to me. How can a function be internal and public at the same time?
I know internal means functions can only be called within the contract and external can be called outside of the contract. So to me, internal is private and external is public but the documentation makes it sound like it can be public and internal at the same time?
So what is the difference, if any, between internal/external and public/private in regards to functions?
1 Answer
0 votes
by (14.5k points)
We conclude from the paragraph that the function types are internal by default, and the contract functions are public by default.
You can specify the type of variable that is supposed to hold a function. This can be done as:
function (param types) {internal|external} [pure|constant|view|payable] [returns (return types)] varName;
The variable varName can be assigned with a function that has the same type as was defined. This can happen only within another function.
Classifiers can be defined by simple definitions as:
• Public - Can be accessed by all contracts.
• External - Can be accessed externally only.
• Internal - Contracts within the system and contracts deriving from them can access.
• Private - Can be accessed only by authorized contracts.
We can say that private is a subset of internal and external is a subset of public.
|
global_01_local_0_shard_00002368_processed.jsonl/46863 | Geoecology Student Submitted Answer
Leaving Cert Geography
Sample Answer
Title: Geoecology: Human Interaction with the Desert Biome
Essay Result: 80/80
Please note that this essay was produced by a leaving certificate student and corrected by their teacher. have made no alteration to this content, this content contains errors produced and corrected by a teacher.
Page 2 of 6
Page 3 of 6
Page 4 of 6
Page 5 of 6
Page 6 of 6
Sign In To View
Sign in or sign up in order to view resources on iRevise
Sign In Create An Account |
global_01_local_0_shard_00002368_processed.jsonl/46864 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://irfront.net/features/page-templates/sample-page-2/60%Weekly2011-08-19 11:26 |
global_01_local_0_shard_00002368_processed.jsonl/46874 | Issued By:
Office of the Chief Information Officer
Passwords are the frontline of protection for user accounts. A poorly chosen password may compromise the University's entire network. As such, all persons accessing University information technology resources must take appropriate steps to select and safeguard their passwords. Users must select "secure" passwords that are not easy to guess by persons who know the system or the user, and that are not "cracked" easily by automated password cracking tools.
Users may not post or share passwords or other personal credentials that they may have for any account. Users must always use secure passwords that are changed periodically.
Users may not use someone else's access information or credentials, such as user ID/password.
Office of the Chief Information Officer
Room 231, Educational Communications Center
(631) 632-9085
Office of Computer Accounts
Room 112, Computing Center
(631) 632-8011 |
global_01_local_0_shard_00002368_processed.jsonl/46882 |
How The Female Gaze was Celebrated and Censored in Cardcaptor Sakura
Sailor Moon female gaze anime manga iwantedwings
Sailor Moon from Sailor Moon
Goku Dragon Ball anime manga female gaze feminism iwantedwings
Goku from Dragon Ball
CLAMP anime manga magical girls feminism female gaze iwantedwings
CLAMP at the Phoenix Anime Convention, 2006
Cardcaptor Sakura anime manga female gaze feminism
Sakura’s signature battle outfit.
Tomoyo Kero Cardcaptor Sakura anime manga female gaze feminism
Tomoyo and Kero-chan spy on Sakura.
Tomoyo Sakura Cardcaptors anime manga female gaze feminism
Tomoyo invading Sakura’s personal space…
Tsubasa Resevoir Chronicles Clamp manga anime female gaze feminism
Tsubasa: Reservoir Chronicles
xxxHolic Clamp manga anime female gaze feminism
6 thoughts on “How The Female Gaze was Celebrated and Censored in Cardcaptor Sakura
1. Deelight says:
Great piece! We often times forget that Sailor Moon wasn’t the only anime geared towards girls in the 90’s. I remember Cardcaptors often had a rough time with constant time changes for cable television and the edits you mentioned. Still it is a show I know many anime fans today credit as one of their favorites because of the points you mentioned.
Liked by 1 person
2. I’m happy that i got to experience in my country the real Card Captors Sakura with not even 1 single censored scene and I loved it and still love the anime up today, and not a single time i wondered why a boy liked another boy (syaoran and yukito) or why a girl liked an older guy (sakura’s friend and the professor) I just watched it and I liked it, guess all the prejudices are aquired throw society
3. tomoyo syndrome says:
Excellent article!
Please keep in mind, though, that the USA is not the West as a whole. Cardcaptor Sakura was given an uncensored dub where I’m from.
4. Ken Coleman says:
With shows like this, I wouldn’t understand that they were meant for a particular gender until years (or decades) later. In both Cardcaptors and Sailor Moon, I was drawn to the mysticism balance of personal lives and heroics (I look for the same thing in Western comics), and the art style. I love art nouveau which was a big inspiration for Clow Reed’s card illustrations, and the designs for the card manifestations and costumes looked like some spectacular type of haute couture fashion.
As a teen, I had a crush on Miss McKenzie and the humanized manifestation of the Snow Card. I recently saw all the dubbed episodes, and am being the CLAMP books. I’m hoping that there are lithographs available of the panel where the Watery Card is shown frozen.
Personally, I’ve always had a particularly strong feminine side for a guy, so I may not be the normative. As a teen, I liked early seasons of Pokémon and Digimon, along with Monster Rancher, Cardcaptors, and some Gundam. I didn’t really care for Dragon Ball Z or much of Adult Swim. In college, I got interested in Witch Hunter Robin, IGPX (Immortal Grand Prix), and some of the Animatrix. Since college, I’ve watched the original Ranma 1/2 and some of the more recent Gundam while I’ve begun building the Bandai Gundam models again.
For subjects outside of manga and anime, I’m a mixed bag for interest in what’s stereotypically masculine or feminine. Gail Simone’s first run with Birds of Prey with Joe Casey’s Uncanny X-Men. Marjorie Liu’s Astonishing X-Men with Scott Snyder and James Tynion IV’s Batman. Anything by Grant Morrison, with anything by Ann Nocenti, and a heaping helping of Grant Morrison’s writing.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
global_01_local_0_shard_00002368_processed.jsonl/46883 | Video Review: Natasha Bedingfield & Sean Kingston “Love Like This”
A young man with long hair rides his skateboard on the sidewalk. Two young women, sitting on their bicycles, check him out. Natasha Bedingfield and her friends get out of their Jeep. She sees a second young man, leaning on his motorcycle, staring at her. They smile at one another. Sean Kingston taps his chest as he stands by a bus.
She sits on a picnic table. Behind her, the second young man’s friends leave and he sits with her on the picnic table. Another couple sits on a loveseat on the grass. She nudges him with her foot. He sits closer to her and they talk. An eight-year-old boy sits with an eight-year-old girl on a bench.
She stands by the tree and dances in place. He takes her hand and she sits on his motorcycle.
She sits with Kingston inside an empty pool. Around her, people dance with cups in their hands. A bartender serves drinks by the bushes. A band plays in the bottom of the pool.
The young man sits by her at the pool. She cuddles next to him. They hold hands as they walk to the hammock. They lie in the hammock together.
She and Kingston give the peace sign.
Rating: 3/5
Natasha Bedingfield tells her friends she’ll meet up with them later. It’s been so long since she talked to anyone. Her last long-term relationship ended a couple of months ago. However, as she smiles at him, she feels something again. At the picnic table, she glances behind her every so often and sees the second young man wave to her. She thinks of going over there. But she isn’t certain what to do with his friends around him. She opts to wait.
As they leave, he asks her if he can sit with her. She says yes. They stare and smile at one another for about ten minutes. She breaks the ice by touching his foot. He moves next to her and whispers in her ear. He offers her to take her ride on his motorcycle. He takes her on the freeway and to see the ocean. They stop at the beach and have something to eat. He mentions one of his friends is having a party and asks if she would like to go.
While at the party, she wanders with her hands in her pocket. Some of the people hide their drinks as she walks by. She assures one couple she’s not a chaperone and sits next to Sean Kingston. Kingston gets her to dance and says if it weren’t for the band, he would’ve gone home hours later.
She sits by herself at the end of the pool for about twenty minutes. She thinks of calling her friends to pick her up. The second young man is somewhere in the house. However, he sits by her and asks if she’s okay. She says yes. He points to the hammock and says they should take it before someone else does. While she cuddles with him in the hammock, she thinks it could work.
Director: Gil Green Year: 2007
Pam Avoledo Administrator
|
global_01_local_0_shard_00002368_processed.jsonl/46889 | Tried many ways and searched on Google but I am unable to input the dash for long vowels in Japanese under OSX.
I am using katakana input mode.
Anyone knows how to do?
• 6
Have you tried a hyphen/dash - (which must be somewhere on your keyboard). – Earthliŋ Feb 26 '17 at 11:32
• 1
Just found how to solve it. "Hyphen/Dash" is a different character. However, if I press the key right to the "0" number, I get this special character. – antoniotajuelo Feb 26 '17 at 14:47
• 1
Is this not the same key as the one you press to get the hyphen/dash when you're not in katakana input mode? – Earthliŋ Feb 26 '17 at 16:39
• It depends on the keyboard. In hiragana, yes, it is the same key. – antoniotajuelo Feb 27 '17 at 14:21
You must log in to answer this question.
Browse other questions tagged . |
global_01_local_0_shard_00002368_processed.jsonl/46900 | jen spencer coaches
Six Sources of Influence
I just finished Change Anything, by Kerry Patterson, Joseph Grenny, David Maxfield and Ron McMillan. This book chronicles a series of scientific studies around change and lays out the 6 sources of influence that it takes to make real change in your life.
I’ve outlined a few of the critical elements they discovered through months of research and interviews. In sum? To change one big thing, you have to change in six different ways to make that shift happen.
This is the Jen Spencer version of Cliff Notes to get you started:
Continue reading
%d bloggers like this: |
global_01_local_0_shard_00002368_processed.jsonl/46905 |
Bare Facts
We've got a lot to say, but very little time in which to say it.
You're in a hurry.
And you have other things to do. So listen up, and we'll get through it quickly.
FACT #1 You are going to die.
Maybe not today... or tomorrow. But sooner or later, you are going to die. And when you do die, what good will be all that you are doing now?
Whatever you do with your life, you must take this No. 1 Reality into consideration.
FACT #2 No one has all the answers.
Bible-bashers who insist that they have a tidy little formula for giving you eternal life are not very convincing. So forget all that, and take a fresh look at the whole dilemma of our limited existence.
For every watch, there must be a watchmaker.
And life as we know it must have come from some incredible Intelligence and some incredible Power.
We will call this first Cause the Creator.
FACT #4 There must be a reason.
Watches are made to keep time. So why were we humans made? We are the only creation that can think ahead to our own deaths. (Remember Fact No. 1?)
And we're the only creation that can think about the existence of our Creator.
Why is this?
FACT #5 There is a plan.
There is disagreement about the specifics, but all who have thought deeply about the reason for our existence, from theologians to song writers, agree that the Creator must have made us to love him and to love others.
FACT #6 Someone has lost the plot.
Whatever the original plan was, everyone seems to have lost it. They have made a business of religion, and the whole world has lost faith.
FACT #7 The Way Out won't be easy.
The 'experts' offer meditation tapes and simple salvation prayers, all guaranteed to save your soul with minimal inconvenience to yourself. Forget it! They do it because it sells... not because it works. The truth is that real love will cost you everything.
FACT #8 The Creator isn't stupid.
We've been put here as a test... to see if we will do what is right even when it's difficult. Real love is not sex, nor is it religious ecstacy. Real love is represented by a cross... suffering... sacrifice... death.
FACT #9 Not everyone wins the lottery.
The Creator only offers eternal life in exchange for the life you have now.
It's "free", but letting go of what you have now is his test to see if you have faith.
Think about it. Would you give it all up for immortality?
FACT #10 You are going to die.
OK, so we said it before. But if you don't keep going back to it, you'll never get things into perspective. What you cling to now (family, friends, wealth, reputation, job) these are all slowly slipping away. But you can trade them all for eternal life.
FACT #11 The world is full of counterfeits.
Ask any religious teacher and you will almost certainly be told that God doesn't really expect you to give up everything to serve him and help others. But they will be lying. You know it. We know it. And they know it.
FACT #12 The Creator can talk.
He has been speaking to you through this booklet, telling you to give it all up and spend your life serving Him. You've heard him talking in your own heart too.
And one day you will stand before him, and he will ask you to answer for how you responded to his voice today.
FACT #13 No one wins the lottery twice.
The Creator has spoken to you today; but he doesn't owe it to you to speak again. This may be your one and only chance for immortality. If you don't act now... you may have eternity to wish you had. If you need help to decide how to respond, go back to Fact #1.
It's stupid to hang onto what you can't keep when you could trade it for something you can't lose.
Pin It |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.